
Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
★ 4.6 (377) · Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy, Package and Software Management, Patch Management
★ 4.9 (17) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Role-Based Access Control (RBAC), Splunk, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Identity and Access Management, Lightweight Directory Access Protocols, Authorization (Computing), Security Controls, Data Access, User Accounts, Scripting, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Security Strategy, Security Strategy, Cybersecurity, Risk Modeling, Risk Analysis, Cyber Risk, Cyber Security Policies, Cyber Threat Intelligence, Cyber Security Assessment, Governance Risk Management and Compliance, Security Management, Crisis Management, Threat Management, Strategic Leadership, Risk Management, Risk Mitigation, Business Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: General Networking, IT Security Architecture, Network Architecture, TCP/IP, OSI Models, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Threat Detection, Network Routers, Infrastructure Security, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Cyber Security Strategy, Firewall, Security Software
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, LLM Application, Network Security, Security Controls, AI Integrations, Responsible AI, Network Monitoring, Hardening, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Cyber Risk, Firewall, Network Protocols, Artificial Intelligence, Generative AI
Intermediate · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Vendor Relationship Management, Supplier Risk Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Risk Mitigation, Computer Security Awareness Training, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, Cybersecurity, Mergers & Acquisitions, Due Diligence
★ 4.8 (51) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Incident Management, IT Security Architecture, Security Architecture Review, Identity and Access Management, Continuous Monitoring, Network Security, Security Management, Security Awareness, Information Technology Architecture, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Computer Security Awareness Training, Infrastructure Security, Threat Modeling, Cyber Security Policies, User Provisioning
Beginner · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, IT Security Architecture, Cloud Standards, Security Controls, Security Testing, Hybrid Cloud Computing, Multi-Cloud, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Data Pipelines, Data Import/Export
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Application Security, Information Management, Security Controls, Configuration Management, Threat Management, Secure Coding, Vulnerability Assessments, System Configuration, Asset Management, Cloud Security, Patch Management, Cloud Management, Software Development Life Cycle, Asset Protection, Cloud Computing, Change Control, Encryption
Intermediate · Course · 1 - 4 Weeks