
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Risk Management
Intermediate · Course · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Statistical Hypothesis Testing, Biostatistics, Sampling (Statistics), Statistical Inference, Scientific Methods, Quantitative Research, Public Health
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Continuous Monitoring, Vulnerability Management, System Monitoring, Event Monitoring, Security Management, Infrastructure Security, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), System Monitoring, Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Data-Driven Decision-Making, Strategic Decision-Making, AI Enablement, Data Ethics, Marketing Analytics, Trend Analysis, Case Studies, Artificial Intelligence, Strategic Planning, Marketing Strategies, Business Ethics
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Test Automation, Performance Testing, Software Testing, API Testing, Test Script Development, Security Testing, Test Tools, CI/CD, Regression Testing, JUnit, Selenium (Software), Scalability, Automation, Test Case, Application Programming Interface (API), Application Security
Beginner · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks