
Johns Hopkins University
Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Generative AI, Cloud Computing, Application Deployment, Security Engineering, Security Management
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Mixed · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Security Controls, System Configuration
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Application Security, Cloud Infrastructure, Network Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Security Information and Event Management (SIEM), Continuous Monitoring, Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Computer Security Incident Management, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Responsible AI, Employee Engagement, Human Resources, Generative AI, Data Ethics, Talent Acquisition, Human Resource Strategy, Recruitment, Trend Analysis, Employee Training, Employee Retention, Data-Driven Decision-Making, Workforce Development, Workforce Planning
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months