
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Application Security, Cybersecurity, Email Security, Identity and Access Management, Firewall
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Encryption, Cryptography, Security Engineering, Data Security, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Geographic Information Systems, Package and Software Management, Scripting, Statistical Analysis, Probability & Statistics, JSON, Image Analysis, Data Validation, Web Scraping, Intelligence Collection and Analysis, Data Analysis, Statistics, Python Programming, Data Processing, Restful API, File Transfer Protocol (FTP), Open Source Technology
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Regulation and Legal Compliance, Data Ethics, Compliance Management, Responsible AI, Compliance Auditing, Governance Risk Management and Compliance, Analytical Skills, Analytics, Data Processing
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Cyber Security Assessment, Brute-force attacks, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Information Privacy, Data Security, Security Testing, Data Ethics, Responsible AI, Data Governance, Cyber Threat Intelligence, Cyber Risk, Cyber Security Strategy, Cloud Security, Data Management, Data Loss Prevention, Cybersecurity, Data Integrity, Security Management, Security Controls, Security Awareness, Cyber Operations, Artificial Intelligence and Machine Learning (AI/ML), Data Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks