
Coursera
Skills you'll gain: Vector Databases, Grafana, Containerization, Role-Based Access Control (RBAC), Docker (Software), MLOps (Machine Learning Operations), Application Deployment, AI Security, Enterprise Security, Scalability, Data Access, Authorization (Computing), Dashboard Creation, Encryption, Cryptographic Protocols, Performance Tuning, System Monitoring, Infrastructure Security, Continuous Monitoring
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Cloud Standards, Cloud Applications, Data Security, Cloud Platforms, Cloud Computing Architecture, Cloud Engineering, Application Security, Cloud Services, Cloud Deployment, Encryption, Incident Management, Security Management, Firewall
Build toward a degree
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Data Security, Security Controls, Health Care Procedure and Regulation, Computer Security Awareness Training, Cybersecurity, Cryptographic Protocols, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM)
Beginner · Course · 1 - 4 Weeks

Arizona State University
Skills you'll gain: Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Data Security, Cyber Security Strategy, Vulnerability Assessments, Security Management, Threat Detection, Information Systems Security, Security Strategy, Security Controls, Network Security, Vulnerability Management, Identity and Access Management, Email Security, Security Awareness, Encryption, Patch Management, Disaster Recovery, Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Cybersecurity, Incident Response, Computer Security Incident Management, Cyber Attacks, Cyber Security Policies, Incident Management, Cyber Threat Intelligence, Security Management, Intrusion Detection and Prevention, Security Strategy, Cyber Threat Hunting, Cyber Risk, Threat Management, Data Security, Security Controls, Encryption, Resilience, Risk Management, Security Software
Beginner · Course · 3 - 6 Months

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Key Management, Network Security, Digital Communications
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cloud Security, Open Web Application Security Project (OWASP), Data Governance, Data Management, Data Security, Cloud API, Secure Coding, Application Security, DevSecOps, Cloud Applications, Key Management, Encryption, Information Privacy, OAuth, Cloud Storage, API Gateway, Threat Modeling, Data Encryption Standard, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cryptographic Protocols, Cyber Security Assessment, Cloud Computing, Data Security, Key Management, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks