
Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, Data Security, Risk Management, Software Development Methodologies, Process Design, Information Systems, Workflow Management, Business Systems Analysis, Microsoft Office, E-Commerce, Microsoft Excel
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Unix, Unix Commands, Shell Script, Bash (Scripting Language), Operating System Administration, Linux, File Systems, Operating Systems, Command-Line Interface, Performance Tuning, System Monitoring, System Programming, File Management, OS Process Management, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Application Security, Open Web Application Security Project (OWASP), Software Testing, Secure Coding, Test Tools, Regression Testing, Unit Testing, Penetration Testing, Security Controls, Computer Security, Test Driven Development (TDD), Debugging, User Acceptance Testing (UAT), Computer Programming, Python Programming, Node.JS, Information Privacy, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: System Monitoring, Dashboard, Application Performance Management, Site Reliability Engineering, Continuous Monitoring, Event Monitoring, Performance Tuning, Performance Metric, Service Level, Generative AI, MLOps (Machine Learning Operations), Business Metrics, Analysis, Service Level Agreement, Distributed Computing, Incident Management, Real Time Data, Data Integration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft SQL Servers, Performance Tuning, SQL, Database Management, Stored Procedure, Database Design, Operational Databases, Database Development, Query Languages, System Monitoring, Network Troubleshooting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Event Monitoring, Cybersecurity, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN), Digital Forensics, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Authentications, OAuth, Development Testing, Software Development Life Cycle, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Security Software, Software Development, Vulnerability Assessments, Data Validation, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Role-Based Access Control (RBAC)
Intermediate · Course · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence
Mixed · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Security Management, Network Security, Cyber Security Policies, Internet Of Things, Data Security, Wireless Networks, Emerging Technologies, Business Logic
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Beginner · Course · 1 - 4 Weeks