
Edureka
Skills you'll gain: Computer Security Incident Management, IT Security Architecture, Incident Management, Cloud Infrastructure, Cloud Standards
★ 4.2 (11) · Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Security Controls, Vulnerability Scanning, ISO/IEC 27001, Penetration Testing, Vulnerability Assessments, Security Information and Event Management (SIEM), Data Security, Compliance Auditing, Security Assertion Markup Language (SAML), Risk Management Framework, Computer Security Incident Management, Multi-Factor Authentication, Authentications, Computer Security Awareness Training, Single Sign-On (SSO), Event Monitoring, Authorization (Computing), Encryption, Advanced Encryption Standard (AES), End User Training and Support
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Computing, Security Information and Event Management (SIEM), Cloud Deployment, Cloud Computing Architecture, Cloud Management, Secure Coding, Threat Detection, Cloud Solutions, Cloud Infrastructure, Network Security, Application Security, Data Security, Encryption, Event Monitoring, Security Testing, Cloud Applications, Data Encryption Standard
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics
★ 4.6 (63) · Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Containerization, Threat Detection, Encryption, Infrastructure Security, Key Management, Network Security, Security Controls, Hardening, Continuous Monitoring, Cryptographic Protocols, Virtual Networking, Authorization (Computing), Authentications, Nginx
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, AWS CloudFormation, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Cloud Engineering, Devops Tools, AWS Identity and Access Management (IAM), Software Development Tools, Data Security, Cloud Security, Network Security, Data Loss Prevention, System Monitoring, Model Deployment, Systems Architecture, AI Integrations, Multi-Factor Authentication, Key Management
Intermediate · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Network Security, Network Administration, Network Protocols, Network Architecture, TCP/IP, Cryptographic Protocols, General Networking, Cryptography, Computer Networking, Encryption, Web Development, Network Routing, Innovation
★ 4.8 (2.8K) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Digital Communications
Beginner · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Cryptographic Protocols, Cybersecurity, Email Security, Firewall, Data Integrity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Management, Risk Management Framework, Risk Management, Network Security, Identity and Access Management, Cybersecurity, Disaster Recovery, IT Security Architecture, Cryptography, OSI Models, Application Security, Cyber Security Policies, Infrastructure Security, Network Administration, Secure Coding, Personally Identifiable Information, Encryption, Security Testing, Information Technology, Software Development Tools
Intermediate · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
★ 4.6 (377) · Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Cryptographic Protocols, Cybersecurity, Encryption, Security Controls, Proxy Servers, Information Privacy, Servers, Communication Systems, Web Servers, Network Routing, Network Analysis, Cloud Hosting, Cloud Deployment
★ 4.1 (36) · Intermediate · Course · 1 - 4 Weeks