
Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Computing Architecture, Data Loss Prevention, Application Security, Cloud Services, Encryption, Security Management, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Secure Coding, Package and Software Management, Node.JS, Vulnerability Management, Javascript, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks, User Accounts
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Management, Law, Regulation, and Compliance, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Governance, Data Science, Cybersecurity, Risk Analysis, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Computer Security Awareness Training, Information Systems Security, Malware Protection, Data Security, Technical Support and Services, Encryption, Security Awareness, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Cloud Security, Encryption, Amazon Web Services, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Computing, Incident Response, IT Security Architecture, Capacity Management, Application Security, Security Controls, Network Security, Hardening, Scalability, Emerging Technologies, Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Vulnerability Management, Security Engineering, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Detection
Intermediate · Course · 1 - 4 Weeks