
Johns Hopkins University
Skills you'll gain: Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Data Storage Technologies, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Kinesis, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, Identity and Access Management, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Serverless Computing, Event-Driven Programming, Real Time Data
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: DevSecOps, Cyber Threat Intelligence, Endpoint Detection and Response, Cyber Operations, Security Information and Event Management (SIEM), Endpoint Security, Threat Detection, Threat Management, Continuous Monitoring, Cybersecurity, Incident Response, Malware Protection, Automation, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Vulnerability Assessments, System Configuration, Security Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Assessments, Multi-Cloud, Cloud Security, Security Controls, Threat Management, Google Cloud Platform, Cloud Management, Enterprise Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Threat Detection, Threat Management, Vulnerability Management, Cloud Security, Vulnerability Assessments, Security Strategy, Multi-Cloud, Google Cloud Platform, Enterprise Security, Security Information and Event Management (SIEM), Security Controls, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months