
LearnKartS
Skills you'll gain: Malware Protection, Network Security, Cybersecurity, Cyber Attacks, Information Systems Security, Intrusion Detection and Prevention, Penetration Testing, Firewall, Hardening, Threat Detection, Brute-force attacks, Internet Of Things, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Systems Integration, Enterprise Architecture, Data Governance, Cloud Deployment, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Problem Management, Threat Modeling, Continuous Monitoring
Advanced · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Hardening, Remote Access Systems, Linux Servers, Linux Administration, Linux, Linux Commands, Authentications, Security Controls, Cryptographic Protocols, Key Management, Public Key Infrastructure, Software Installation
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Information Management, Business Ethics, Performance Measurement, Compliance Management, Governance, Business Planning, Organizational Strategy
Beginner · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Event Monitoring, Incident Response, Security Management, Cyber Security Policies, Command-Line Interface, System Monitoring, Configuration Management, Object Oriented Design, User Interface (UI), Computer Displays, Simulations
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Regulatory Compliance, Security Controls, Vulnerability Assessments, Penetration Testing, Compliance Auditing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Enterprise Security, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Monitoring, Azure Active Directory, Vulnerability Management, Apple iOS, Remote Access Systems, Configuration Management, Automation
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud API, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Key Management, Distributed Denial-Of-Service (DDoS) Attacks, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, Regulation and Legal Compliance, Risk Management, Compliance Management, Regulatory Compliance, Governance Risk Management and Compliance, Risk Analysis, Cloud Security, Business Continuity, Cyber Risk, Security Management, Vendor Management, Incident Response, Data Security, Personally Identifiable Information, Business Analysis
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Data Security, Key Management, Cloud Applications, Role-Based Access Control (RBAC), Cloud Storage, Data Encryption Standard, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months