
Skills you'll gain: Data Integrity, Database Architecture and Administration, Data Integration, Power BI, Data Maintenance, Database Administration, Database Management, Microsoft SQL Servers, Data Validation, Relational Databases, Databases, Application Programming Interface (API), Dashboard Creation, Dashboard, Data Quality, Interactive Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC)
★ 4.9 (21) · Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Management, Database Development, Database Architecture and Administration, Apache Hadoop, Database Theory, Query Languages, Database Management Systems, Big Data, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Infrastructure Security, Cloud-Native Computing, Hardening, Network Security, Containerization, Security Controls, Cyber Security Policies, Authorization (Computing), Identity and Access Management, Threat Detection, Verification And Validation
Advanced · Course · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Infrastructure, Cloud Computing Architecture, IT Automation, General Networking, Cloud Technologies, Infrastructure Security, Cybersecurity, Security Controls, Infrastructure as Code (IaC), Digital Transformation
★ 4.7 (305) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Google App Engine, Cloud Deployment, Cloud Applications, Google Cloud Platform, Application Deployment, Cloud Development, Cloud API, Web Applications, Cloud Services, Flask (Web Framework), Data Access, Cloud Storage, Image Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Application Security, Security Testing, Risk Management Framework, Systems Development Life Cycle, Secure Coding, Threat Modeling, Software Testing, Software Development, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Development Testing, Software Development Methodologies, Application Programming Interface (API), Code Reusability, Databases, Agile Methodology, Exploitation techniques, Data Validation
★ 4.9 (18) · Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Network Architecture, Cloud Computing, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Application Security, Infrastructure Security, AI Security, Security Strategy, IT Automation, Mobile Security
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Google Cloud Platform, Identity and Access Management, Prompt Engineering Tools, Cloud Development, Authentications, Kubernetes, Cloud Security, Cloud Applications, Data Loss Prevention, Cloud Deployment, Virtual Machines, Cloud Storage, Cloud Services, Cloud Management, Encryption, OAuth, Threat Detection
★ 4.6 (87) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Cloud Computing Architecture, Virtualization and Virtual Machines, Network Administration, Cloud Computing, Firewall, Virtual Networking, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Network Infrastructure, Cloud Services, General Networking, Augmented Reality, Cloud Security, Security Controls, Network Protocols, Peripheral Devices
★ 4.8 (27) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Enterprise Security, Threat Detection, Data Loss Prevention, Network Analysis
★ 5 (7) · Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
★ 4.1 (8) · Intermediate · Guided Project · Less Than 2 Hours