
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Public Cloud, Network Security, Data Storage, Identity and Access Management, Data Centers, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Augmented and Virtual Reality (AR/VR), Virtualization, Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Modeling, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Security Awareness, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Peer Review, Governance, Leadership and Management, Discussion Facilitation, Philanthropy, Public Administration, Organizational Effectiveness, Performance Review, Organizational Leadership, Community Development, Organizational Structure, Leadership, Case Studies, Analysis
Mixed · Course · 1 - 3 Months

Skills you'll gain: Medical Privacy, Personally Identifiable Information, Information Privacy, Security Awareness, Data Security, Cybersecurity, Security Controls, Health Information Management, Data Sharing, Authorization (Computing), Health Care Procedure and Regulation, Data Access, Disaster Recovery
Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Data Security, Data Loss Prevention, Security Management, Data Management, Security Controls, Personally Identifiable Information, Information Systems Security, Data Governance, Information Management, Encryption, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Data Security, Virtual Machines, Remote Access Systems, Role-Based Access Control (RBAC), Data Storage Technologies, Identity and Access Management, Databases, Containerization, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks