
Skills you'll gain: Cybersecurity, Cyber Governance, Cyber Attacks, Endpoint Security, Threat Detection, Incident Response, Cyber Security Assessment, Malware Protection, Network Security, Cyber Security Policies, Information Systems Security, Computer Security, Threat Modeling, Intrusion Detection and Prevention, Network Monitoring, Firewall, Network Analysis, Encryption
Intermediate · Course · 1 - 3 Months

Advancing Women in Tech
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, Incident Response, Endpoint Detection and Response, Computer Security Incident Management, Security Information and Event Management (SIEM), Google Gemini, Infrastructure Security, Vulnerability Assessments, Interactive Data Visualization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Cybersecurity, Incident Response, Google Gemini, Security Information and Event Management (SIEM), Computer Security Incident Management, Continuous Monitoring, Cloud Security, Infrastructure Security, Artificial Intelligence, Real Time Data
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Incident Response, Security Information and Event Management (SIEM), Google Gemini, Vulnerability Management, Technical Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Endpoint Detection and Response, MITRE ATT&CK Framework, Incident Response, Cybersecurity, Security Information and Event Management (SIEM), Google Gemini
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, MITRE ATT&CK Framework, Incident Response, Vulnerability Management, Google Gemini, Interactive Data Visualization, Continuous Monitoring, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months