
Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Cryptography, Web Applications, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Architecture Review, Data Management, Cyber Security Assessment, IT Security Architecture, Event Monitoring
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Coursera
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Salesforce, Authentications, Salesforce Development, Data Access, Role-Based Access Control (RBAC), Enterprise Security, Identity and Access Management, Security Controls, Data Security, Authorization (Computing), Event Monitoring, Continuous Monitoring, Application Security, Web Components, Data Sharing, User Provisioning, Responsive Web Design, User Accounts, Mobile Development, Customer Relationship Management (CRM) Software
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Data Governance, User Provisioning, Data Management, Data Security, Azure Active Directory, Cloud Development, Secure Coding, IT Security Architecture, Cloud Applications, Application Security, Identity and Access Management, Key Management, Encryption
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Application Security, Security Testing, Security Strategy, Information Systems Security, Security Engineering, Security Controls, Software Architecture, Software Development Methodologies, Software Development Life Cycle, Business Strategies, Penetration Testing, Compliance Management
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Data Management, Infrastructure as Code (IaC), Enterprise Security, Zero Trust Network Access, Application Security, Infrastructure Security, Security Controls, Threat Management, Security Requirements Analysis, Data Quality, Compliance Management, Identity and Access Management
Intermediate · Course · 3 - 6 Months