
Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Apache, File Transfer Protocol (FTP), Linux Servers, Linux Administration, Linux, Web Servers, Remote Access Systems, Command-Line Interface, Unix Commands, File Management, Network Protocols, Network Performance Management, Security Controls
Intermediate · Course · 1 - 4 Weeks

Princeton University
Skills you'll gain: Blockchain, Cryptographic Protocols, Cryptography, FinTech, Application Security, Encryption, Payment Systems, Security Engineering, Network Protocols, Key Management, Digital Assets, Data Storage, Transaction Processing, Distributed Computing, Financial Regulation, Market Dynamics
Mixed · Course · 1 - 3 Months

Skills you'll gain: Disaster Recovery, Microsoft Azure, Microsoft Copilot, Cloud Security, Continuous Monitoring, Systems Administration, Cloud Storage, Patch Management, Virtual Machines, Identity and Access Management, Data Security
Beginner · Course · 1 - 3 Months

Skills you'll gain: Predictive Modeling, Django (Web Framework), Data Visualization, Statistical Modeling, Feature Engineering, Application Programming Interface (API), Programming Principles, Relational Databases, Databases, Development Environment, Data Science, Data Cleansing, Animation and Game Design, Authorization (Computing), Scripting Languages, Integrated Development Environments, Software Development Tools, Style Guides, Software Design
Intermediate · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Microsoft Servers, Network Infrastructure, Network Protocols, Performance Tuning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Apache Kafka, Apache Spark, Data Pipelines, Distributed Computing, Real Time Data, Security Controls, Configuration Management, Data Processing, Performance Tuning, Encryption, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Linux Commands, Authorization (Computing), Identity and Access Management, Security Controls, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Development Testing, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Security Controls, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Predictive Analytics
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks