The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Hardening, Remote Access Systems, Linux Servers, Linux Administration, Linux, Linux Commands, Authentications, Security Controls, Cryptographic Protocols, Key Management, Public Key Infrastructure, Software Installation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Kinesis, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, Identity and Access Management, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Active Directory, Authorization (Computing), Identity and Access Management, User Provisioning, Cloud Management, Cloud Security, User Accounts, Cloud Storage, Data Security, Data Storage, Key Management, Data Storage Technologies, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Python Programming, Scripting, Algorithms, Data Integrity
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Public Key Cryptography Standards (PKCS), Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming
Beginner · Course · 1 - 4 Weeks

Fred Hutchinson Cancer Center
Skills you'll gain: Code Review, Version Control, GitHub, Package and Software Management, CI/CD, Continuous Integration, Open Source Technology, Development Environment, Continuous Deployment, Software Development Tools, Docker (Software), Containerization, Scientific Methods, Devops Tools, Data Sharing, Key Management, Git (Version Control System), Automation, Software Documentation, Technical Documentation
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Cloud Infrastructure, Google Cloud Platform, Cloud Computing, Cloud Services, Cloud Computing Architecture, Cloud Storage, Data Storage Technologies, Key Management, Security Controls, System Monitoring
Intermediate · Course · 1 - 3 Months

Princeton University
Skills you'll gain: Blockchain, Cryptographic Protocols, Cryptography, FinTech, Application Security, Encryption, Payment Systems, Security Engineering, Network Protocols, Key Management, Digital Assets, Data Storage, Transaction Processing, Distributed Computing, Financial Regulation, Market Dynamics
Mixed · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Identity and Access Management, Infrastructure Security, Authorization (Computing), Data Storage, Role-Based Access Control (RBAC), Network Security, System Configuration, Continuous Monitoring, Encryption, Key Management, Containerization
Intermediate · Course · 1 - 4 Weeks