
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Virtual Networking, Security Controls, Cloud Computing, Threat Management, Application Security, Data Security
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months
Skills you'll gain: AI Security, Mobile Security, Model Deployment, Mobile Development, Continuous Monitoring, Application Security, Threat Modeling, Apple iOS, Security Requirements Analysis, System Monitoring, Encryption, Threat Management, Security Management, Information Privacy, Program Implementation
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Cybersecurity, Security Awareness, Threat Modeling, Encryption, Cryptography, Security Strategy, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Routing Protocols, Network Security, Network Routing, TCP/IP, Open Shortest Path First (OSPF), Network Protocols, Network Switches, Virtual Local Area Network (VLAN), Network Monitoring, Virtual Private Networks (VPN), Firewall, Network Infrastructure, Network Troubleshooting, Border Gateway Protocol, Network Performance Management, Virtual Networking, Network Analysis, Authentications, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Business Continuity Planning, System Monitoring, Network Security, Continuous Monitoring, Cyber Operations, Disaster Recovery, Incident Response, Cloud Computing, Zero Trust Network Access, Security Controls, Data Security, Firewall, Virtual Private Networks (VPN), Service Level Agreement, Vulnerability Management, Patch Management, Clinical Monitoring, Configuration Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon CloudWatch, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Configuration Management, Automation
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks