
Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Database Administration, Relational Databases, Database Management, Database Architecture and Administration, MySQL, Database Systems, IBM DB2, Operational Databases, PostgreSQL, Stored Procedure, Data Storage Technologies, Disaster Recovery, Role-Based Access Control (RBAC), Performance Tuning, Authentications, User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Governance, Health Information Management, Cloud Security, Health Care, Data Architecture, Identity and Access Management, Real Time Data, Scalability, Health Care Procedure and Regulation, Medical Records, Data Management, Data Sharing, Clinical Data Management, Microsoft Azure, Role-Based Access Control (RBAC), Regulatory Compliance, Information Privacy, Interoperability, Security Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Star Schema, Role-Based Access Control (RBAC), Power BI, Database Design, Data Modeling, Financial Modeling, Data Analysis Expressions (DAX), Authorization (Computing), Relational Databases, Financial Data, Data Security, Security Controls, Dashboard, Data Access, Model Deployment, Gross Profit
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Power BI, Microsoft Power Platform, DevOps, Microsoft Azure, Application Deployment, Enterprise Architecture, Real Time Data, Business Intelligence, Collaborative Software, Role-Based Access Control (RBAC), Scalability, Data Integration, Data Governance, Data Modeling, System Configuration, Collaboration, Analytics, Compliance Management, Data Sharing, Problem Solving
Intermediate · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Cyber Risk, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Data Governance, Real Time Data, Data Lakes, Microsoft SQL Servers, Compliance Management, Metadata Management, Data Architecture, Data Security, Power BI, Operational Databases, System Monitoring, Identity and Access Management, Event-Driven Programming
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks