
Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Azure, User Provisioning, Cloud Security, Azure Active Directory, Data Governance, DevSecOps, Data Management, Security Information and Event Management (SIEM), Identity and Access Management, Microsoft 365, Endpoint Security, Data Security, Zero Trust Network Access, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Hybrid Cloud Computing, Microsoft Copilot, Encryption, Authentications
Advanced · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Test Tools, Security Information and Event Management (SIEM), Event Monitoring, Malware Protection, Network Security
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Azure Active Directory, Data Loss Prevention, Endpoint Security, Cloud Security, Active Directory, Personally Identifiable Information, Multi-Factor Authentication, Data Security, Multi-Tenant Cloud Environments, User Provisioning, Single Sign-On (SSO), Security Controls, Threat Management, Role-Based Access Control (RBAC), User Accounts
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Database Design, Software Design, Usability Testing, User Interface and User Experience (UI/UX) Design, Software Architecture, Software Design Patterns, Database Management, Systems Design, Application Security, Design Strategies, Operating Systems
Intermediate · Course · 1 - 3 Months

Scrimba
Skills you'll gain: Cloud Applications, Cloud API, Application Deployment, API Gateway, Application Programming Interface (API), Cloud Computing, Serverless Computing, Application Security, LLM Application, Web Servers, OpenAI, Distributed Computing
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Continuous Monitoring, Medical Privacy, Risk Management, Health Information Management, Health Care Procedure and Regulation, Risk Mitigation, Information Privacy, Security Management, Risk Analysis, Patient Safety, Personally Identifiable Information, Information Systems Security, Security Controls, Data Security, Regulatory Compliance, Threat Modeling, Vulnerability Assessments
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: Terraform, Infrastructure as Code (IaC), Infrastructure As A Service (IaaS), Microsoft Azure, Cloud Infrastructure, IT Automation, DevOps
Beginner · Guided Project · Less Than 2 Hours

The Hong Kong University of Science and Technology
Skills you'll gain: Acceptance Testing, Software Development Methodologies, Configuration Management, Debugging, Software Development Life Cycle, Software Testing, Software Engineering, Unified Modeling Language, Integration Testing, User Acceptance Testing (UAT), Unit Testing, System Implementation, Secure Coding, Test Case, Requirements Analysis, Agile Methodology, Project Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Management, Risk Management Framework, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Intermediate · Course · 1 - 3 Months