
Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Strategy, Data Security, Security Controls, Cybersecurity, Threat Management, Continuous Monitoring, Encryption, Authentications, Penetration Testing, Data Management
★ 3.6 (16) · Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, Angular, OAuth, Test Driven Development (TDD), Cryptography, Web Components, Data Validation, Unit Testing, Vue.JS, Development Testing, Data Security, Authentications, Encryption, Authorization (Computing), HTML and CSS, Hypertext Markup Language (HTML), Web Applications, Javascript, Security Strategy, Computer Programming
★ 4.3 (102) · Beginner · Specialization · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Vendor Relationship Management, Supplier Risk Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Risk Mitigation, Computer Security Awareness Training, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, Cybersecurity, Mergers & Acquisitions, Due Diligence
★ 4.8 (51) · Mixed · Course · 1 - 4 Weeks
Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Security Testing, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Security Awareness, Dependency Analysis, Amazon Elastic Compute Cloud, Compliance Management, Automation
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, IT Security Architecture, Cloud Standards, Security Controls, Security Testing, Hybrid Cloud Computing, Multi-Cloud, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Computer Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Network Administration, Security Software, Systems Administration, System Configuration, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence
★ 5 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux, Linux Commands, Application Security, Operating System Administration, Security Software, Security Controls, Service Management, Patch Management, Systems Administration, Information Systems Security, Package and Software Management
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Security Strategy, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Cyber Security Assessment, Test Automation, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Linux, Security Controls, Hardening, Authentications, Network Security, Linux Commands, System Configuration, Servers, Computer Security, Server Administration, Encryption, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Embedded Software, Security Engineering, Hardening, Embedded Systems, Information Systems Security, Security Controls, Network Security, Threat Modeling, Cybersecurity, Encryption, System Configuration, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Cryptography, Key Management, File Systems, Computer Hardware, Package and Software Management
Intermediate · Course · 3 - 6 Months
Skills you'll gain: Vulnerability Scanning, Digital Forensics, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Security Testing, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Cybersecurity
★ 5 (7) · Beginner · Course · 1 - 4 Weeks