
Skills you'll gain: Network Security, Incident Response, Business Continuity, Security Controls, Disaster Recovery, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Cybersecurity, Email Security, Firewall, Algorithms
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Virtual Networking, Security Controls, Cloud Computing, Threat Management, Application Security, Data Security
Intermediate · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, Ethical Standards And Conduct, Encryption
Intermediate · Specialization · 3 - 6 Months

Alex Genadinik
Skills you'll gain: Data Security, Risk Management Framework, Key Management, Cybersecurity, Encryption, Data Storage, USB, Blockchain, Computer Hardware
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, iOS Development, Secure Coding, Encryption, Network Security, Application Programming Interface (API), Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Data Storage
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Cloud Security, Data Integrity, Data Infrastructure, Cloud Infrastructure, Data Management, Data Security, Infrastructure Security, Encryption, Private Cloud, Security Controls, Network Security, Cloud Storage, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks