
Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

Skills you'll gain: Compliance Management, Microsoft 365, Threat Management, Compliance Auditing, Regulatory Compliance, Compliance Reporting, Microsoft Azure, Governance Risk Management and Compliance, Data Governance, Records Management, Investigation, Data Loss Prevention, Personally Identifiable Information, Information Privacy, Data Security, Risk Management, Auditing
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Juniper Network Technologies, Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Border Gateway Protocol, Routing Protocols, Network Switches, Network Routing, TCP/IP, Network Architecture, Virtual Private Networks (VPN), Network Administration, Network Protocols, Network Security, Network Troubleshooting, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Continuous Monitoring, Vulnerability Management, Data Security, System Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Identity and Access Management, Security Management, Authorization (Computing), System Configuration, User Accounts, Collaborative Software, Data Governance, Live Streaming
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Epidemiology, Data-Driven Decision-Making, Public Health, Public Health and Disease Prevention, Health Care, Infectious Diseases, Data Collection, Data Analysis, Data Quality, Decision Support Systems, Data Management, Health Technology
Mixed · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
Beginner · Project · Less Than 2 Hours
Johns Hopkins University
Skills you'll gain: Health Policy, Data Presentation, Data Quality, Data Literacy, Public Health, Health Equity, Health Care, Policy Development, Health Disparities, Data Strategy, Public Health and Disease Prevention, Policy Analysis, Data-Driven Decision-Making, Data Collection, Data Analysis, Data Management, Data Visualization Software
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Personally Identifiable Information, Data Pipelines, Cloud-Based Integration, Cloud Storage, Data Security, Data Integration, Data Management, Data Transformation, Cloud Management, DevOps
Advanced · Project · Less Than 2 Hours
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months