
Packt
Skills you'll gain: Geographic Information Systems, Package and Software Management, Scripting, Statistical Analysis, Probability & Statistics, JSON, Image Analysis, Data Validation, Web Scraping, Intelligence Collection and Analysis, Data Analysis, Statistics, Python Programming, Data Processing, Restful API, File Transfer Protocol (FTP), Open Source Technology
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Encryption, Cryptography, Security Engineering, Data Security, Cybersecurity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: AI Security, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Responsible AI, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months