
Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Windows, Authentications, Operating System Administration, Azure Active Directory, Microsoft Intune (Mobile Device Management Software), Windows PowerShell, Identity and Access Management, System Configuration, User Provisioning, Patch Management, Active Directory, Desktop Support, Remote Access Systems, Single Sign-On (SSO), Application Deployment, Cloud Deployment, Software Installation, Role-Based Access Control (RBAC), Technical Support and Services, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, Relational Databases, Database Architecture and Administration, Oracle Databases, Data Storage Technologies, Data Migration, Key Management, Data Integrity, Encryption, Data Loss Prevention, Data Security
Advanced · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: vSphere Networking and Storage, Virtual Networking, vSphere DRS & HA, Storage vMotion, Role-Based Access Control (RBAC), Virtual Local Area Network (VLAN), Virtual Machines, Performance Tuning, Network Switches, Security Controls, Network Troubleshooting, Infrastructure Security, Data Storage Technologies, Capacity Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Role-Based Access Control (RBAC), Microsoft Azure, Azure Active Directory, Cloud Solutions, Identity and Access Management, Cloud Management, Solution Architecture, Data Governance, Cloud Security, Cloud Computing Architecture, System Monitoring, Authorization (Computing), Authentications, Key Management
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Cloud Infrastructure, Vulnerability Scanning, Role-Based Access Control (RBAC), Configuration Management, Scalability
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Configuration Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Centers, Network Security, Network Troubleshooting, Virtual Machines, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Cloud Infrastructure, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Advanced · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Routing Protocols, Network Routing, Network Routers, Virtual Private Networks (VPN), TCP/IP, Network Protocols, General Networking, Network Security
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks