Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy, Package and Software Management, Patch Management
★ 4.9 (17) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Mobile Security, System Monitoring, Network Monitoring, Security Controls, Internet Of Things, Wireless Networks, Application Security, Information Systems Security, Authorization (Computing), Cybersecurity, Identity and Access Management, Cyber Attacks, General Networking, Authentications, Cloud Security, TCP/IP, Network Protocols, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Attacks, Endpoint Security, Infrastructure Security, Cloud Infrastructure
★ 5 (10) · Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Azure Active Directory, Microsoft Azure, Web Applications, Cloud Applications, Application Security, Cloud Security, Identity and Access Management, Authorization (Computing), Key Management, Application Development, Security Strategy, Application Programming Interface (API), Authentications, Encryption
★ 4.6 (14) · Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Model Training, Threat Modeling, Machine Learning Methods, Python Programming
★ 4.8 (8) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Software Systems, System Programming, Cybersecurity, Real Time Data, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Systems Design
★ 4.3 (1.2K) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Google Gemini, Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Application Deployment, AI Integrations, Generative AI, Cloud Security
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
★ 5 (6) · Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

CertNexus
Skills you'll gain: Application Security, Human Factors (Security), Secure Coding, Open Web Application Security Project (OWASP), Vulnerability, Computer Security, Vulnerability Management, Vulnerability Assessments, Data Security, Security Strategy, Security Controls, Cyber Security Strategy, Application Design, Computer Programming, Design, Python Programming, Javascript, Design Strategies, JavaScript Frameworks, Node.JS
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Cyber Engineering, Security Controls, Security Engineering, Security Architecture Review, Security Requirements Analysis, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Industrial Design
Beginner · Course · 1 - 3 Months