
Google Cloud
Skills you'll gain: Threat Detection, Threat Management, Vulnerability Management, Cloud Security, Vulnerability Assessments, Multi-Cloud, Computer Security Incident Management, Security Information and Event Management (SIEM), Enterprise Security, Cloud Services, Scenario Testing, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Cloud Security, Incident Response, Security Controls, Computer Security Incident Management, Data Security, Identity and Access Management, Vulnerability Assessments, Application Security, Security Management, Network Security, Encryption, Vulnerability Management, Data Management, Patch Management
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, Vulnerability Assessments, DevOps, GitHub, Automation
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Management, Law, Regulation, and Compliance, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Governance, Data Science, Cybersecurity, Risk Analysis, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Computing Architecture, Cloud Standards, Solution Architecture, Cybersecurity, Cloud Computing, Security Controls, Security Strategy, Enterprise Architecture, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Computing, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Continuous Monitoring, Role-Based Access Control (RBAC), Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months