
Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Red Hat Enterprise Linux, Command-Line Interface, Linux Administration, Linux Commands, User Accounts, Linux, Operating System Administration, Software Installation, System Configuration, Systems Administration, Security Controls, File Management, System Monitoring, User Interface (UI)
Mixed · Course · 1 - 3 Months

Skills you'll gain: 3D Modeling, 3D Assets, Computer Graphics, Computer Graphic Techniques
Mixed · Course · 1 - 4 Weeks

University of Glasgow
Skills you'll gain: Healthcare Industry Knowledge, Diversity Equity and Inclusion Initiatives, Health Technology, Health Disparities, Health Systems, Health Care, Telehealth, Emerging Technologies, Health Care Administration, Pharmaceuticals, Health Policy, Public Health and Disease Prevention, Interviewing Skills
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, Intrusion Detection and Prevention, System Monitoring, Security Information and Event Management (SIEM), Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Risk Management Framework, Systems Development Life Cycle, Risk Management, NIST 800-53, Enterprise Risk Management (ERM), Operational Risk, Governance Risk Management and Compliance, Continuous Monitoring, Law, Regulation, and Compliance, Regulatory Requirements, Cyber Security Policies, Security Controls, Authorization (Computing), Cyber Security Assessment
Mixed · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Vulnerability Assessments, Mobile Security, Open Web Application Security Project (OWASP), Cloud Security, Threat Modeling, MITRE ATT&CK Framework, Network Security, Business Logic, Scripting, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Server Side, Encryption
Intermediate · Course · 1 - 4 Weeks