
Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Cloud API, Data Security, Data Access, Key Management, Role-Based Access Control (RBAC), Cloud Storage, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Cyber Attacks, Continuous Monitoring, Enterprise Security, Security Awareness, Cyber Operations, Information Technology Operations, Automation, Systems Integration
Beginner · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Computing Architecture, Data Loss Prevention, Application Security, Cloud Services, Encryption, Security Management, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Threat Detection, Security Controls, Threat Management, Intrusion Detection and Prevention, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Endpoint Security, Network Monitoring, Malware Protection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Loss Prevention, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Integrity, Security Strategy, Regulatory Requirements, Incident Response
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Governance, Law, Regulation, and Compliance, Security Strategy, Culture Transformation, Enterprise Security, Cyber Operations, Communication, Business Risk Management, Business Leadership, Organizational Leadership, Leadership, Dashboard
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric
Mixed · Course · 3 - 6 Months