
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Supplier Management, Cyber Security Strategy, Influencing, Risk Management, Performance Measurement, Business Relationship Management, Business Metrics, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Technical Support and Services, Software Installation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Ubuntu, Cybersecurity, Cyber Attacks, Microsoft Windows, Computer Security, Computer Security Awareness Training, Information Systems Security, Linux, Cyber Security Policies, Network Security, Virtualization, Linux Commands, Linux Administration, Data Ethics, Data Security, Virtualization and Virtual Machines, Hardening, Command-Line Interface, Operating System Administration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Open Web Application Security Project (OWASP), Application Security, Vulnerability Scanning, Data Security, Data Validation, Cross Platform Development, Development Environment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Threat Modeling, Threat Detection, Computer Security Incident Management, Malware Protection, Cybersecurity, Cyber Attacks, Network Analysis, Microsoft Windows, Operating Systems, Virtual Environment
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Incident Response, Vulnerability Assessments, Systems Architecture, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks, User Accounts
Beginner · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Cloud Standards, Security Controls, Security Testing, Application Development, Containerization, Software Development, CI/CD, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months