
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Data Integrity, Risk Mitigation, Risk Analysis, Cross-Functional Collaboration, Encryption, Accountability
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: NSX-T Network Virtualization, Virtual Networking, Virtualization, Network Architecture, Disaster Recovery, Software-Defined Networking, Network Security, Business Continuity Planning, IT Automation, Firewall, Network Routing, Business Transformation, Application Security, Hybrid Cloud Computing
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Network Administration, Virtual Machines, Cloud Computing, Firewall, Virtual Private Networks (VPN), Mobile Security, Network Troubleshooting, Computer Networking, Cloud Security, Wireless Networks, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Kubernetes, Cloud Security, Cloud Applications, Generative AI, Cloud Storage, Encryption, OAuth, Security Controls, Virtual Machines, Network Infrastructure, Cloud Computing, Containerization, Threat Management, Data Security
Intermediate · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Responsible AI, AI Security, Telehealth, Health Technology, Generative AI, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Healthcare Ethics, Regulatory Compliance, Health Care Procedure and Regulation, Security Strategy, Medical Privacy, Data Security, Analysis, Innovation, Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Ansible, Red Hat Enterprise Linux, Linux Administration, Hardening, Linux, Security Controls, Security Engineering, Authorization (Computing), Containerization, Computer Security, System Configuration, Context Management
Intermediate · Course · 1 - 3 Months