
Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Apache Kafka, Apache Spark, Data Pipelines, Distributed Computing, Real Time Data, Data Integration, Apache Hadoop, Security Controls, Configuration Management, Data Processing, Performance Tuning, Encryption, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: JUnit, File I/O, Unit Testing, Program Development, Debugging, Java, Maintainability, Software Development, Secure Coding, Software Testing, Test Case, Authentications, Application Security, Cryptography, Object Oriented Programming (OOP), Eclipse (Software), Integrated Development Environments, Encryption, Data Structures
Intermediate · Course · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Platforms, Cloud Computing Architecture, Application Security, Cloud Services, Encryption, Firewall, Virtual Networking, Security Controls, Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Open Source Technology, Cross Platform Development, Configuration Management, JSON
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks