
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Business Risk Management, Business Leadership, Organizational Leadership, Dashboard, Leadership
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating Systems, Network Security, Microsoft Windows, Command-Line Interface, Systems Administration, System Support, Unix, Mac OS, System Configuration, Unix Commands, Network Troubleshooting, Linux, Firewall, Information Technology, Software Installation, Technical Support, Help Desk Support, Malware Protection, Mobile Security, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Security Controls, Information Systems Security, Security Management, Information Systems Security Assessment Framework (ISSAF), Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Ethical Standards And Conduct, SQL
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Google Cloud Platform, YAML, Cloud Deployment, Data Persistence, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Application Programming Interface (API), Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Incident Response, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Assurance, Digital Forensics, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, AI Enablement, Threat Detection, Compliance Management, AI Security, Workflow Management, Automation, Incident Response
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Infrastructure As A Service (IaaS), Generative AI, Cloud Services, Containerization, Virtual Machines, Data Loss Prevention, Cloud Storage, Application Development, Security Management, Cloud Computing, Virtual Networking, Encryption, Malware Protection
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months