
Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Test Script Development, Brute-force attacks, Cloud Security, Network Analysis, API Testing, General Data Protection Regulation (GDPR), Wireless Networks, Security Controls
Intermediate · Specialization · 1 - 3 Months

Packt
Skills you'll gain: Secure Coding, API Testing, Application Programming Interface (API), Security Testing, Open Web Application Security Project (OWASP), Penetration Testing, Application Security, Restful API, Authentications, Personally Identifiable Information, Brute-force attacks, Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Cybersecurity
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Microsoft Copilot, Application Security, Data Validation, Web Applications, Security Controls, Vulnerability Assessments, Data Security, Data Integrity, Encryption
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Investigation, NIST 800-53, Cyber Security Assessment, Personally Identifiable Information, Failure Analysis, Root Cause Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Operating Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Process Optimization, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Personally Identifiable Information, Security Controls, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Personally Identifiable Information, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Enterprise Risk Management (ERM), Business Risk Management, Security Information and Event Management (SIEM), Security Strategy
Beginner · Specialization · 1 - 3 Months