
Packt
Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Knowledge Accelerators
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Law, Regulation, and Compliance, Regulatory Compliance, Data Security, Compliance Management, Data Ethics, Data Governance, Customer Data Management, Regulation and Legal Compliance, Data Management, Data Integrity, Global Marketing, Data Processing, Accountability
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Administration, Virtual Local Area Network (VLAN), General Networking, Network Architecture, TCP/IP, Local Area Networks, Computer Networking, Command-Line Interface, Network Infrastructure, Wireless Networks, Network Security, Network Switches, OSI Models, Dynamic Host Configuration Protocol (DHCP), Network Routing, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Oracle
Skills you'll gain: Oracle Cloud Applications, Cloud Applications, Application Development, Application Design, Database Application, Oracle Databases, Application Deployment, Application Security, UI Components, Data Import/Export, Interactive Data Visualization
Beginner · Course · 1 - 4 Weeks

Queen Mary University of London
Skills you'll gain: Cloud Services, Legal Risk, Cloud Computing, Intellectual Property, Contract Negotiation, Cloud Security, Vendor Contracts, Contract Review, Law, Regulation, and Compliance, Service Level Agreement, Data Security, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Universidad Nacional Autónoma de México
Skills you'll gain: Database Systems, Relational Databases, Database Management, SQL, Databases, Database Design, Database Architecture and Administration, Information Systems, MySQL, Data Modeling, Transaction Processing, Information Systems Security, Performance Tuning, Conceptual Design
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Docker (Software), Integration Testing, Object-Relational Mapping, Secure Coding, Database Design, Solution Architecture, Enterprise Architecture, Systems Integration, Authorization (Computing), Database Development, Data Validation, Transaction Processing
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Remote Access Systems, Linux, Web Applications, Internet Of Things, Embedded Systems, Application Programming Interface (API), Command-Line Interface, Application Security, Electronics, Control Systems, System Configuration, Hardware Design, Python Programming, Software Installation, Peripheral Devices
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months