
Skills you'll gain: Vulnerability Assessments, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Security Controls, IT General Controls (ITGC), Cloud Security, Cloud Computing, Cyber Security Assessment, Cybersecurity, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Risk Management Framework, Data Security, Identity and Access Management, Incident Response, Technical Communication
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Network Security, Disaster Recovery, General Networking, Network Administration, Authentications, Network Architecture, Vulnerability Assessments, Computer Networking, Network Infrastructure, Wireless Networks, Cybersecurity, Network Monitoring, Local Area Networks, Network Performance Management, Telecommunications, Network Protocols, Network Troubleshooting, OSI Models, Network Switches, Event Monitoring
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

28DIGITAL
Skills you'll gain: Cybersecurity, Computer Security, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Security Policies, Threat Management, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Intermediate · Course · 1 - 3 Months

University of Florida
Skills you'll gain: Medical Devices, Healthcare Ethics, Health Technology, Internet Of Things, Patient Safety, Healthcare Industry Knowledge, Telehealth, Vulnerability, Medical Privacy, Regulatory Compliance, Law, Regulation, and Compliance, Patient Advocacy, Security Awareness, Cybersecurity
Mixed · Course · 1 - 3 Months

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface
Beginner · Course · 1 - 3 Months

Indian Institute of Science
Skills you'll gain: Biomedical Engineering, Medical Devices, Medical Equipment and Technology, Vital Signs, Chemistry, ISO 13485 Standard, Materials science, Diagnostic Tests, Electrophysiology, Biology, Neurology, Electronics, Artificial Intelligence, Oncology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Governance, Governance Risk Management and Compliance, Enterprise Security, Compliance Management, Regulatory Requirements, Business Metrics, Performance Metric, Ethical Standards And Conduct
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Non-Verbal Communication, Storytelling, Conflict Management, Interpersonal Communications, Driving engagement, De-escalation Techniques, Rapport Building, Diversity Awareness, Workplace inclusivity, Cultural Responsiveness, Empathy & Emotional Intelligence, Ethical Standards And Conduct, Psychology, Vulnerability
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months