
Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Computing Architecture, Data Loss Prevention, Application Security, Cloud Services, Encryption, Security Management, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Management, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Information Privacy, Authentications
Beginner · Course · 1 - 3 Months

Northeastern University
Skills you'll gain: Object Oriented Design, Java, Software Architecture, Object Oriented Programming (OOP), Data Structures, Software Design, Computer Programming, Programming Principles, Unified Modeling Language, Application Development, UI Components
Mixed · Course · 1 - 3 Months

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Spring Framework, Spring Boot, Model View Controller, Hibernate (Java), Java, Web Applications, Object-Relational Mapping, Application Deployment, Application Security, Database Application, Software Development Tools, Authentications, Development Environment, Authorization (Computing), Query Languages
Intermediate · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, User Accounts, Virtual Private Networks (VPN)
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Software Design, Programming Principles, Debugging, Vulnerability Assessments, C (Programming Language), Software Development Methodologies
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: JUnit, Unit Testing, Debugging, Java, Maintainability, Software Development, Secure Coding, Software Testing, Test Case, Authentications, Application Security, Cryptography, Object Oriented Programming (OOP), Eclipse (Software), Integrated Development Environments, Encryption, Data Structures, File Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Cloud Computing, Security Controls, Security Engineering, Vulnerability Assessments, System Configuration
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Disaster Recovery, Digital Assets, Vulnerability Assessments, Regulatory Compliance, Enterprise Security, Data Security, Law, Regulation, and Compliance, Encryption, Cybersecurity, Network Security, Emerging Technologies, Distributed Computing, Transaction Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks