
Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Vulnerability Management, Identity and Access Management, Cybersecurity, Security Controls, Incident Management, Vulnerability Assessments, Mobile Security, Hardening, Threat Detection, Application Security, Continuous Monitoring, Threat Management, Digital Forensics, Network Security, Wireless Networks, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Continuous Monitoring, Firewall, System Monitoring
Intermediate · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Manufacturing Operations, Process Design, Product Design, Manufacturing and Production, Production Process, Digital Transformation, Industrial Engineering, Internet Of Things, Computer-Aided Design, Technology Roadmaps, Enterprise Resource Planning, Technology Strategies, Information Technology, Simulation and Simulation Software, Business Technologies, Cloud Computing
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Authorization (Computing), Identity and Access Management, User Accounts, Containerization, Development Environment, Cloud Engineering
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Systems Integration, Enterprise Architecture, Data Governance, Cloud Deployment, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Problem Management, Threat Modeling, Continuous Monitoring
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months