
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, File Management, Data Lakes, Cloud Storage, Data Security, Cloud Management, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), User Provisioning, Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Data Governance, User Provisioning, Data Management, Data Security, Azure Active Directory, Cloud Development, Secure Coding, IT Security Architecture, Cloud Applications, Application Security, Identity and Access Management, Key Management, Encryption
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, PostgreSQL, Database Administration, Google Cloud Platform, Authentications, Security Controls, Database Management, Identity and Access Management, Key Management
★ 4.9 (8) · Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Cyber Attacks, Cybersecurity, Identity and Access Management, Authentications, Security Controls, Threat Management, Data Security, Information Privacy, Cyber Risk, Authorization (Computing)
★ 4.6 (40) · Intermediate · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk
★ 4.8 (40) · Beginner · Course · 1 - 4 Weeks
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Computer Security Incident Management, Vulnerability Assessments, Cloud Computing Architecture, Endpoint Detection and Response, Cloud Computing, Intrusion Detection and Prevention, Event Monitoring, Cybersecurity, Security Management, Cyber Attacks, Data Security, Security Strategy, User Provisioning, Infrastructure Security, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Data Governance, Database Management, Database Architecture and Administration, Data Management, Data Warehousing, Database Design, SQL, Transaction Processing, Stored Procedure, Data Security, Disaster Recovery, Encryption, Server Side, Data Encryption Standard, Data Integrity
Mixed · Course · 1 - 3 Months

Skills you'll gain: Data Integration, Microsoft Azure, Cloud Storage, Disaster Recovery, Data Architecture, Database Design, Data Infrastructure, Data Storage, Cloud Security, NoSQL, Encryption, Relational Databases, Scalability, Performance Tuning, Database Management, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Network Architecture, Cloud Computing, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Application Security, Infrastructure Security, AI Security, Security Strategy, IT Automation, Mobile Security
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Management, Information Technology Architecture, Computer Security Awareness Training, Computer Security, Human Factors (Security), Artificial Intelligence
★ 4.9 (20) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks