
Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Application Security, Cloud Security, Vulnerability Assessments, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, AI Security, Amazon Web Services, Data Ethics, Generative AI, AWS SageMaker, Cloud Security, MLOps (Machine Learning Operations), Data Security, Data Governance, Artificial Intelligence, Encryption, Public Cloud, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Network Security, System Configuration, Network Administration, Amazon Web Services, Virtual Private Networks (VPN), Infrastructure Security, Network Troubleshooting, Security Information and Event Management (SIEM), Threat Management, Endpoint Security, Intrusion Detection and Prevention, System Monitoring, Threat Detection, Cloud Deployment
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Infrastructure As A Service (IaaS), Generative AI, Cloud Services, Containerization, Virtual Machines, Data Loss Prevention, Cloud Storage, Application Development, Security Management, Cloud Computing, Virtual Networking, Encryption, Malware Protection
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Law, Regulation, and Compliance, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Security Strategy, Telecommuting, Infrastructure Security
Beginner · Specialization · 1 - 3 Months