
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Role-Based Access Control (RBAC)
Advanced · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Threat Detection, Vulnerability Management, Threat Management, Cloud Security, Vulnerability Assessments, Security Management, Multi-Cloud, Risk Management Framework, Incident Management
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Applied Machine Learning, Machine Learning, AI Enablement, MLOps (Machine Learning Operations), Technology Roadmaps, Data-Driven Decision-Making, Artificial Intelligence and Machine Learning (AI/ML), Business Analytics, Business Solutions, Organizational Strategy, AI Product Strategy, Organizational Change, Product Roadmaps, Feasibility Studies, System Requirements, Solution Design, Training Programs
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Security Controls, Docker (Software), Image Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Data Loss Prevention, Cloud Storage, Data Encryption Standard, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: ISO/IEC 27001, Threat Management, Security Management, Data Security, Cyber Risk, Risk Management, Continuous Monitoring, Vulnerability Assessments, Cyber Security Policies, Security Controls, Governance Risk Management and Compliance, Cybersecurity, Information Systems, Scenario Testing, Asset Protection
Beginner · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Resource Management, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cloud Security, Identity and Access Management, User Accounts, Authorization (Computing), Payment Card Industry (PCI) Data Security Standards, Data Security, Role-Based Access Control (RBAC), Security Engineering, Cloud Standards, Security Controls, Network Security, Encryption, Firewall, Continuous Monitoring, CI/CD, Key Management, Virtual Networking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks