Learn software security principles for protecting applications. Understand how to identify vulnerabilities, implement security measures, and perform security testing.
Skills you'll gain: Exploratory Data Analysis, Data Literacy, Data Storytelling, Data-Driven Decision-Making, Data Presentation, SAS (Software), Trend Analysis, Data Manipulation, Data Analysis, Data Quality, Analysis, Scatter Plots, Analytics, Data Visualization, Interactive Data Visualization, Technical Communication, Data Ethics, Data Visualization Software, Research, Data Cleansing
Beginner Ā· Specialization Ā· 1 - 3 Months

Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)
Beginner Ā· Course Ā· 1 - 4 Weeks
Skills you'll gain: Blockchain, Cryptography, Design, Emerging Technologies, Stakeholder Analysis, Distributed Computing, Financial Services, Public Key Cryptography Standards (PKCS), Information Privacy, Governance
Beginner Ā· Course Ā· 1 - 3 Months

Skills you'll gain: DevOps, CI/CD, User Story, Microservices, OpenShift, Application Deployment, Continuous Integration, Cloud-Native Computing, Code Review, Kubernetes, Test Driven Development (TDD), Scrum (Software Development), Agile Methodology, Sprint Planning, Containerization, Restful API, Flask (Web Framework), Docker (Software), Kanban Principles, Cloud Computing
Intermediate Ā· Course Ā· 1 - 3 Months

Coursera
Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, Application Security, C++ (Programming Language)
Intermediate Ā· Guided Project Ā· Less Than 2 Hours

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
Beginner Ā· Course Ā· 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Bioinformatics, Data Structures, Jupyter, Python Programming, Programming Principles, Object Oriented Programming (OOP), Scripting, Data Processing, Package and Software Management, Data Manipulation, File Management
Mixed Ā· Course Ā· 1 - 4 Weeks

Hebrew University of Jerusalem
Skills you'll gain: Electrophysiology, Artificial Neural Networks, Neurology, Computer Science, Cell Biology, Physiology, Psychology, Basic Electrical Systems, Network Analysis, Computational Logic, Simulation and Simulation Software, Mathematical Modeling, Biology
Mixed Ā· Course Ā· 1 - 3 Months

University of Pennsylvania
Skills you'll gain: Blockchain, Cryptography, Digital Assets, Investments, Portfolio Management, Investment Management, FinTech, Asset Management, Financial Analysis, Financial Market, Emerging Technologies, Public Key Infrastructure, Finance, Encryption, Return On Investment, Distributed Computing, Risk Analysis
Mixed Ā· Course Ā· 1 - 4 Weeks

University of Pennsylvania
Skills you'll gain: Matplotlib, Data Analysis, Pandas (Python Package), Data Visualization, Data Science, Data Cleansing, Pivot Tables And Charts, Data Visualization Software, Data Manipulation, Scatter Plots, NumPy, Data Transformation, Jupyter, Data Validation, Data Import/Export, Histogram, Python Programming, Data Structures, Programming Principles, Scripting Languages
Beginner Ā· Course Ā· 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, NIST 800-53, Security Controls, Disaster Recovery, Authorization (Computing), Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Change Control, Cybersecurity, Risk Management, System Monitoring, Security Strategy, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Vulnerability Management, Configuration Management, Enterprise Security
Intermediate Ā· Specialization Ā· 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis
Intermediate Ā· Course Ā· 3 - 6 Months