University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Key Management, Transaction Processing, Authentications, FinTech, Data Security, Information Privacy, Emerging Technologies, Data Integrity, Distributed Computing
★ 4.5 (53) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Secure Coding, Public Key Cryptography Standards (PKCS), Key Management, Public Key Infrastructure, Python Programming, Brute-force attacks, Scripting, Algorithms
★ 5 (13) · Mixed · Course · 1 - 3 Months

Institut Mines-Télécom
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Authentications, FinTech, Data Security, Payment Systems, Distributed Computing, Transaction Processing, Network Protocols, Data Structures, Data Integrity, Verification And Validation
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Security Controls, Configuration Management, Package and Software Management, Cybersecurity, Identity and Access Management, Software Installation, Computer Programming, Information Technology
★ 4.6 (19) · Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, C and C++, C++ (Programming Language)
★ 4.2 (16) · Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Event Monitoring, Exploit development, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Security Architecture Review, Patch Management, Code Review, Incident Management, Application Deployment, Authorization (Computing), Data Validation
★ 4.8 (30) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Scalability, Security Controls, Authorization (Computing), Authentications, Data Access, Cyber Security Policies, Role-Based Access Control (RBAC), Performance Tuning, Data Governance, Token Optimization, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Model Evaluation, Exploratory Data Analysis, Event-Driven Programming, Encryption, Cryptographic Protocols, Server Side, Web Development, Regression Analysis, Apache, Model Training, Web Services, Machine Learning Algorithms, Classification Algorithms, Data Preprocessing, Secure Coding, Public Key Cryptography Standards (PKCS), Web Scraping, Natural Language Processing, Python Programming
★ 4.8 (75) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Authentications, Authorization (Computing), Identity and Access Management, User Provisioning, User Accounts, Role-Based Access Control (RBAC), Group Policy, Google Cloud Platform, Cyber Security Policies
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Order Management, ASP.NET, Order Management Systems, User Interface (UI) Design, .NET Framework, Authentications, User Interface and User Experience (UI/UX) Design, UI Components, User Interface (UI), User Accounts, Payment Processing, Web Design, Authorization (Computing), E-Commerce, Identity and Access Management, Payment Systems, Payment Processing and Collection, Debugging
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks