
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Web Services, Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
★ 4.5 (255) · Mixed · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, User Provisioning, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking, User Accounts
★ 4.8 (67) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Cyber Attacks, Encryption, IT Security Architecture, Identity and Access Management, Threat Management, Threat Detection, Firewall, Key Management, Security Management, Infrastructure Security, Security Controls, Network Planning And Design, Authorization (Computing), Public Key Infrastructure, Authentications, Risk Management Framework
★ 4.6 (9) · Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Application Security, Secure Coding, Security Software, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Web Applications, PHP (Scripting Language), Application Frameworks, Browser Compatibility, Computer Programming
★ 5 (7) · Beginner · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Security Testing, Threat Modeling, Vulnerability Scanning, Vulnerability Assessments, AI Personalization, Continuous Integration, Open Source Technology, CI/CD, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
★ 4.6 (377) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Cyber Attacks, Network Architecture, Cloud Computing, Threat Management, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Cloud Deployment, Application Security, Infrastructure Security
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, IT Automation, Automation, Systems Integration
★ 4.9 (9) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Google App Engine, Cloud Deployment, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Security Controls, Identity and Access Management, Cloud Computing, Network Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Computer Security Incident Management, Vulnerability Assessments, Cloud Computing Architecture, Endpoint Detection and Response, Cloud Computing, Intrusion Detection and Prevention, Event Monitoring, Cybersecurity, Security Management, Cyber Attacks, Data Security, Security Strategy, User Provisioning, Infrastructure Security, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Authentications, OAuth, Threat Management, Software Testing, Development Testing, Software Development Life Cycle, Unit Testing, Security Testing, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Databases, Security Software, Software Development, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity
Intermediate · Course · 3 - 6 Months