
Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Multi-Factor Authentication, Human Factors (Security)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Cyber Security Assessment, Regulatory Requirements
Intermediate · Course · 1 - 3 Months

Workday
Skills you'll gain: Workday (Software), No-Code Development, Branding
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Business Writing, Risk Analysis, Communication, Presentations, Analysis
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Modeling, Enterprise Resource Planning, Dashboard, Business Intelligence, Data Visualization Software, Workflow Management, Pivot Tables And Charts, Data Import/Export, Extract, Transform, Load, Data Integration, Microsoft Excel, Data Transformation, Data Security, Scripting
Mixed · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Development, Software Configuration Management, Software Development Life Cycle, Software Testing, System Configuration, Threat Modeling, Application Programming Interface (API), Cloud Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Amazon Web Services, Containerization, AWS CloudFormation, Infrastructure as Code (IaC), Amazon CloudWatch, Docker (Software), CI/CD, Kubernetes, Cloud-Native Computing, Cloud Infrastructure, Application Deployment, Serverless Computing, Software Development Life Cycle, Configuration Management, Disaster Recovery, Continuous Deployment, Amazon Elastic Compute Cloud, Cloud Management, DevOps, API Gateway
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Identity and Access Management, Infrastructure Security, Authorization (Computing), Data Storage, Role-Based Access Control (RBAC), Network Security, System Configuration, Continuous Monitoring, Encryption, Key Management, Containerization
Intermediate · Course · 1 - 4 Weeks