
Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Application Performance Management, Event Monitoring, Vulnerability Management, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Solutions, Cloud Infrastructure, Cloud Computing, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Security Assessment, Cyber Security Strategy, Risk Management, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Service Level Agreement, Data Governance, Incident Management, Problem Management, Database Management Systems, Asset Management, Disaster Recovery, Business Continuity Planning, Business Continuity, Information Technology Operations, IT Service Management, Information Systems, IT Infrastructure, Data Security, Auditing, Patch Management
Intermediate · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Enterprise Security, Incident Response, Malware Protection, Automation, Artificial Intelligence
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Knowledge of Apple Software, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Performance Testing
Advanced · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Advanced · Course · 1 - 3 Months