
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Anomaly Detection, Cyber Threat Intelligence, Threat Detection, AI Security, Security Awareness, Network Analysis, Generative AI, Prompt Engineering, Email Security, Machine Learning
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, DevOps, GitHub, Vulnerability Management, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Firewall, Virtual Machines, Virtual Networking, TCP/IP, Identity and Access Management, Proxy Servers, Test Tools
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Management, Google Cloud Platform, Cloud Computing, Command-Line Interface, Cloud Platforms, Authorization (Computing), Software Installation
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Systems Integration, Enterprise Architecture, Data Governance, Cloud Deployment, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Problem Management, Threat Modeling, Continuous Monitoring
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks