
Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Development Testing, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Endpoint Detection and Response, Threat Modeling, Cybersecurity, Incident Response, Security Information and Event Management (SIEM), Continuous Monitoring, Vulnerability Management, Vulnerability Assessments, Google Gemini, Generative AI
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Open Web Application Security Project (OWASP), Large Language Modeling, Vulnerability Assessments, Vulnerability Management, Application Security, Secure Coding, Security Controls, Safety and Security, Google Cloud Platform, Security Requirements Analysis, Cloud API, API Design, Application Development, System Configuration, Program Development
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Network Administration, Network Routing, Remote Access Systems, User Accounts, Authorization (Computing)
Advanced · Specialization · 1 - 3 Months

Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, MITRE ATT&CK Framework, Cybersecurity, Cyber Attacks, Real-Time Operating Systems, Internet Of Things, Infrastructure Security, Network Security
Beginner · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Universidades Anáhuac
Skills you'll gain: Malware Protection, Information Systems Security, Cybersecurity, Cyber Attacks, Data Security, Security Awareness, Network Security, Information Assurance, Threat Modeling, Security Controls, Human Factors (Security), Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months