
Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Cloud Computing, Security Controls, Security Engineering, Vulnerability Assessments, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, System Monitoring, Microsoft Azure, DevOps, Security Controls, Secure Coding, Identity and Access Management, Continuous Monitoring, Event Monitoring, Personally Identifiable Information, Cloud Security, Application Performance Management, Vulnerability Scanning, Information Assurance, Performance Tuning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Augmented and Virtual Reality (AR/VR), Virtualization, Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Cloud Storage, Data Encryption Standard, Security Controls, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication
Beginner · Course · 1 - 3 Months