
Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity Planning, Business Continuity, Cryptography, Disaster Recovery, Data Management, Digital Assets, Vulnerability Assessments, Regulatory Compliance, Enterprise Security, Threat Modeling, Asset Protection, Vulnerability Management, Regulation and Legal Compliance, Data Security, Law, Regulation, and Compliance, Application Security, Application Frameworks, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Security Testing, Data Security, Cybersecurity, Exploitation techniques, Test Tools, Cyber Security Strategy, Security Controls, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication, Document Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (7) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
★ 4.9 (19) · Intermediate · Course · 1 - 3 Months
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Key Management, Transaction Processing, Authentications, FinTech, Data Security, Information Privacy, Emerging Technologies, Data Integrity, Distributed Computing
★ 4.5 (53) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.8 (20) · Mixed · Course · 1 - 4 Weeks

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Protection, Data Security, Cryptography, Security Management, Cybersecurity, Security Awareness, Key Management, Security Controls, Securities (Finance), Multi-Factor Authentication, Authentications, Securities Trading, Audit Working Papers, Financial Market, Market Data, Financial Regulations, Regulatory Compliance, Financial Accounting
★ 4.7 (93) · Beginner · Course · 1 - 4 Weeks
Coursera
Skills you'll gain: AI Security, Vulnerability Scanning, Hardening, DevSecOps, Vulnerability Assessments, Responsible AI, Identity and Access Management, MLOps (Machine Learning Operations), Cyber Governance, Infrastructure Security, Application Security, Security Controls, CI/CD, Continuous Monitoring, AI Personalization, Resilience, Compliance Management, Anomaly Detection, Data Integrity, Engineering
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Incident Response, Incident Management, Operational Risk, Case Studies, Security Management, Supplier Risk Management, Risk Management, Intellectual Property, Cybersecurity, Manufacturing Operations, Security Controls, Security Strategy, Cyber Security Strategy, Cyber Governance, Asset Protection, Enterprise Security, Disaster Recovery, Compliance Reporting, Governance, Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Key Management, Python Programming, Scripting, User Interface (UI), UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks