
Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Investigation, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Financial Regulation, Financial Regulations, Bank Regulations, FinTech, Financial Services, Financial Industry Regulatory Authorities, Law, Regulation, and Compliance, Mobile Banking, Regulatory Requirements, Fraud detection, Data Security, Cybersecurity, Insurance, Blockchain, Information Privacy
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: API Design, Restful API, Middleware, Application Deployment, Software Testing, Postman API Platform, Microsoft Azure, Cloud Development, Software Documentation, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Application Security, Cloud Computing, Cloud Infrastructure, Cloud Applications, IT Security Architecture, Identity and Access Management, Data Integrity, Secure Coding, Private Cloud, Security Awareness, Data Centers, Data Management, Personally Identifiable Information, Threat Modeling, Security Testing, Security Controls, General Data Protection Regulation (GDPR), Service Level
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Data Centers, Network Security, Virtualization and Virtual Machines, Network Troubleshooting, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), Infrastructure Security, TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Advanced · Course · 1 - 3 Months

Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Continuous Monitoring, IT Security Architecture
Intermediate · Specialization · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Information Privacy
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months