
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Network Security, Encryption, Data Security, Cloud Computing, Cybersecurity, Security Controls, Threat Detection, Google Cloud Platform, Infrastructure Security, Authentications, Authorization (Computing), Data Governance, Multi-Factor Authentication, Identity and Access Management
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Data Security, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS SageMaker, AWS Kinesis, Amazon Redshift, Cloud Security, MLOps (Machine Learning Operations), Amazon S3, Amazon CloudWatch, AWS Identity and Access Management (IAM), Data Pipelines, Real Time Data, Feature Engineering, Data Storage, Data Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, System Monitoring, Event Monitoring, Kubernetes, Continuous Monitoring, Application Security, Hardening, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks