
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence
Intermediate · Course · 1 - 3 Months
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Data Quality, Quality Assurance, Data Entry, Clinical Trial Management Systems, Case Report Forms, Clinical Trials, Data Cleansing, Data Management, Data Integrity, Data Collection, Data Sharing, Data Security, Patient Treatment, Continuous Monitoring, Statistical Analysis
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months
Skills you'll gain: Blockchain, Cryptography, Design, Emerging Technologies, Stakeholder Analysis, Distributed Computing, Financial Services, Public Key Cryptography Standards (PKCS), Information Privacy, Governance
Beginner · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Database Systems, Computer Security Incident Management, Security Management, Ubuntu, Routing Protocols, Database Design, Application Development, Network Architecture, Linux Commands, TCP/IP, Operating Systems, Database Theory, Web Design and Development, Cascading Style Sheets (CSS), Web Development, Data Structures, Python Programming, Data Analysis, Software Development
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Network Protocols, TCP/IP, General Networking, Network Monitoring, Network Security, Network Analysis, Linux, Software Installation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Network Security, Network Troubleshooting, Software-Defined Networking, Network Monitoring, TCP/IP, Network Architecture, Computer Networking, Network Performance Management, Network Protocols, General Networking, Cybersecurity, Network Infrastructure, Local Area Networks, Network Analysis, OSI Models, Network Routing, Network Switches
Build toward a degree
Beginner · Course · 1 - 3 Months

École Polytechnique
Skills you'll gain: Emerging Technologies, Telecommunications, Cryptography, Simulation and Simulation Software, Physics, Computing Platforms, Algorithms, Mathematical Modeling
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Architecture, Software-Defined Networking, Network Planning And Design, Virtual Private Networks (VPN), Network Security, Service Oriented Architecture, Network Performance Management, Computer Networking, Emerging Technologies, Communication Systems, Network Protocols, Telecommunications, Cloud Computing Architecture, Mobile Security, Infrastructure Security, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks