
Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Law, Regulation, and Compliance, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Security Strategy, Telecommuting, Infrastructure Security
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Digital Forensics, Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, ISO/IEC 27001, Network Security, Malware Protection, Incident Management, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, DevSecOps, Continuous Monitoring, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Role-Based Access Control (RBAC), Virtual Private Networks (VPN), Firewall, Virtual Networking, Network Security, Multi-Factor Authentication, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS SageMaker, Amazon CloudWatch, AWS CloudFormation, Infrastructure as Code (IaC), CI/CD, Amazon Web Services, Devops Tools, AWS Identity and Access Management (IAM), Data Security, Cloud Security, Network Security, System Monitoring, Model Deployment, Systems Architecture, Data Pipelines, Multi-Factor Authentication, Key Management
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Secure Coding, Cloud Deployment, Database Development, Maintainability, Server Side, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Azure Active Directory, Authentications, Microsoft Azure, Authorization (Computing), Network Security, Virtual Private Networks (VPN), Identity and Access Management, Firewall, Active Directory, Cloud Security, User Provisioning, Security Management, Role-Based Access Control (RBAC), Virtual Networking, Kubernetes, Single Sign-On (SSO), User Accounts, Data Security, Data Access, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: AI Security, Responsible AI, Data Security, Security Strategy, Security Management, Infrastructure Security, Data Ethics, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Role-Based Access Control (RBAC), Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Key Management
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks