
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Proxy Servers, Google Cloud Platform, Firewall, Infrastructure Security, Network Monitoring, Intrusion Detection and Prevention, Threat Detection, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Secure Coding, Cloud API, Cloud Development, Database Development, Application Deployment, Database Management, Server Side, Web Applications, Authentications
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, Endpoint Detection and Response, Security Management, Infrastructure Security, Microsoft Servers, Threat Detection, Information Systems Security, Security Information and Event Management (SIEM), Windows Servers, System Monitoring, Payment Card Industry (PCI) Data Security Standards, Configuration Management, Virtual Machines, Disaster Recovery
Beginner · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Systems Integration, Enterprise Architecture, Cloud-Based Integration, Data Governance, Data Management, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Security Requirements Analysis, Threat Modeling, Continuous Monitoring, Cyber Security Strategy
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud Computing, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography
Beginner · Course · 1 - 4 Weeks

The University of Sydney
Skills you'll gain: Design Thinking, Human Centered Design, Innovation, Service Design, Prototyping, Ideation, Product Development, Design, Case Studies, User Feedback
Beginner · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, System Monitoring, Virtualization
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Beginner · Specialization · 1 - 3 Months