
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Human Factors (Security), Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: File Management, Linux Administration, File Systems, OS Process Management, Linux, Linux Servers, Data Security, Authorization (Computing), Linux Commands, Data Loss Prevention, Operating System Administration, Continuous Monitoring, Information Systems Security, System Monitoring, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Fred Hutchinson Cancer Center
Skills you'll gain: Data Ethics, Data Sharing, Personally Identifiable Information, Clinical Research Ethics, Medical Privacy, Data Management, Healthcare Ethics, Clinical Research, Data Security, Information Privacy, Health Information Management, Encryption
Beginner · Course · 1 - 4 Weeks
Google Cloud
Skills you'll gain: Data Governance, Data Loss Prevention, Gmail, Google Workspace, Information Management, Data Management, Data Security, Document Management, Records Management, Data Storage, Data Access, Data Import/Export, Email Security, System Configuration
★ 4.8 (671) · Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, User Provisioning, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking, User Accounts
★ 4.8 (67) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Amazon Web Services, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, AI Security, Cloud Management, Key Management, Cryptography, Continuous Monitoring, Firewall, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: iOS Development, Secure Coding, Encryption, Network Security, Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Cryptography, Data Storage
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Management, Database Development, Database Architecture and Administration, Apache Hadoop, Database Theory, Query Languages, Database Management Systems, Big Data, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Patch Management, Data Security, Information Systems Security, Cloud Security, Cybersecurity, Cyber Attacks, Internet Of Things, Mobile Security, Hardening, Personally Identifiable Information, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Vulnerability Management, Release Management, Data Storage, Operating Systems, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks