
Skills you'll gain: ASP.NET, Web Applications, Microservices, Single Sign-On (SSO), Performance Tuning, Identity and Access Management, Full-Stack Web Development, C# (Programming Language), Application Development, Application Security, Cloud Development, Multi-Factor Authentication, Authentications, Role-Based Access Control (RBAC), Scalability, Real Time Data
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Requirements Analysis, User Requirements Documents, Software Development Methodologies, Requirements Elicitation, Agile Methodology, Functional Requirement, Software Design Documents, System Requirements, Software Development Life Cycle, Verification And Validation, Technical Communication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Open Web Application Security Project (OWASP), Application Security, Vulnerability Scanning, C# (Programming Language), Data Security, Data Validation, Cross Platform Development, Development Environment
Intermediate · Course · 1 - 4 Weeks
University of Minnesota
Skills you'll gain: Cybersecurity, Cloud Computing, Cloud Services, Information Technology, Technology Solutions, IT Infrastructure, Technical Management, Information Systems, Mobile Security, Emerging Technologies, Innovation, Business Transformation, Blockchain, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Security Strategy, Incident Response, End User Training and Support, Human Factors (Security), Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Postman API Platform, Authentications, API Testing, Authorization (Computing), Restful API, Secure Coding, Java Programming, Application Design, Spring Boot, User Accounts, API Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks