Master information security principles for protecting digital assets. Learn about cybersecurity, encryption, and risk management.

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Dashboard, Amazon Web Services, Interactive Data Visualization, Data Visualization Software, Amazon Redshift, Big Data, Cloud Security, Security Controls, Encryption, Amazon S3, Key Management, Data Integration, Predictive Modeling, Data Cleansing, Machine Learning
Advanced · Course · 1 - 3 Months
Skills you'll gain: Software-Defined Networking, Network Architecture, Network Planning And Design, Wide Area Networks, Virtual Private Networks (VPN), Network Security, Network Performance Management, Network Infrastructure, Firewall, Network Routing, Encryption, Real Time Data
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Apple software proficiency, Apple iOS, Apple Hardware proficiency, Mac OS, Application Deployment, Enterprise Application Management, Mobile Security, Package and Software Management, Hardening, Malware Protection, Software Installation, Software Testing, Configuration Management
Advanced · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Computing, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Docker (Software), Microservices, Authentications, OAuth, Integration Testing, Event-Driven Programming, Secure Coding, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Authorization (Computing), Systems Integration, Transaction Processing
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months