
Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Threat Detection, Threat Management, Network Administration, Multiprotocol Label Switching, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Network Protocols
Advanced · Course · 3 - 6 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, Security Management, Threat Detection, Compliance Management, Artificial Intelligence, Business Process Automation, Automation, Incident Response, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Data Ethics, Generative AI, AWS SageMaker, Cloud Security, MLOps (Machine Learning Operations), Data Security, Role-Based Access Control (RBAC), Data Governance, Artificial Intelligence, Encryption, Public Cloud, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Network Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Cloud Storage, Data Encryption Standard, Security Controls, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Cloud Security, Network Security, Infrastructure Security, Application Security, Role-Based Access Control (RBAC), Cyber Security Policies, Verification And Validation, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, System Monitoring, Microsoft Azure, DevOps, Security Controls, Secure Coding, Identity and Access Management, Continuous Monitoring, Event Monitoring, Personally Identifiable Information, Cloud Security, Application Performance Management, Vulnerability Scanning, Information Assurance, Performance Tuning
Intermediate · Course · 1 - 4 Weeks