
Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Knowledge of Apple Software, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Performance Testing
Advanced · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Google Cloud Platform, Cloud Security, Network Security, Network Administration, Firewall, Data Migration
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Kubernetes, Cloud-Native Computing, Google Cloud Platform, YAML, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Data Storage, Scalability
Intermediate · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Network Security, Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Containerization, Docker (Software), Microservices, Authentications, OAuth, Integration Testing, Event-Driven Programming, Secure Coding, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration, Authorization (Computing), Transaction Processing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Network Architecture, Network Planning And Design, Cloud Computing Architecture, General Networking, Network Routing, Google Cloud Platform, Computer Networking, Network Security, Network Performance Management, Virtual Private Networks (VPN), Firewall, Load Balancing, Scalability, Cloud Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks