
Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Authentications, Unit Testing, Application Security, Security Testing, Authorization (Computing), Secure Coding, Identity and Access Management, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Model Evaluation, Exploratory Data Analysis, Event-Driven Programming, Encryption, Server Side, Web Development, Regression Analysis, Apache, Web Services, Machine Learning Algorithms, Classification Algorithms, Data Preprocessing, Public Key Cryptography Standards (PKCS), Web Scraping, Natural Language Processing, Web Applications, Key Management, Python Programming, Predictive Modeling
Beginner · Specialization · 3 - 6 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Threat Detection, Security Controls, Security Testing, Application Development, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Secure Coding, API Testing, Application Programming Interface (API), Security Testing, Open Web Application Security Project (OWASP), Penetration Testing, Application Security, Restful API, Authentications, Personally Identifiable Information, Brute-force attacks, Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Cybersecurity
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Restful API, Application Deployment, Web Development, Full-Stack Web Development, Cloud API, Application Development, Software Documentation, Data Validation
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Network Security, Encryption, Advanced Encryption Standard (AES), Network Protocols, Cybersecurity, Cyber Attacks, Secure Coding, Key Management, Security Engineering, Data Integrity, Security Management
Beginner · Course · 1 - 3 Months
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks