
Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Networking Hardware, Shell Script, Cybersecurity, Network Security
★ 4.3 (47) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft 365, Data Integration, Report Writing, IT Automation
Intermediate · Course · 3 - 6 Months

Skills you'll gain: User Provisioning, User Accounts, Data Import/Export, Salesforce, Data Integrity, Data Migration, Data Management, Role-Based Access Control (RBAC), Identity and Access Management, Data Security, Authorization (Computing), Data Sharing, Data Access, Security Controls, Customer Relationship Management (CRM) Software
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (599) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols, Enterprise Security, Computer Security
★ 4.7 (24) · Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, Scalability, Data Access, Security Controls, User Provisioning, Security Management, Collaborative Software, Content Management, Data Security, Data Management, Data Governance, Verification And Validation
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, Azure Active Directory, Okta, Cybersecurity, Security Management, Data Security, Cloud Security
Beginner · Course · 1 - 3 Months

Saviynt
Skills you'll gain: Identity and Access Management, Governance Risk Management and Compliance, Self Service Technologies, AI Workflows, Risking, Automation, Cyber Risk, AI Security, Data Governance, Cloud Security, AI Enablement, Zero Trust Network Access, Cyber Governance, Anomaly Detection, Cyber Security Assessment, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Cyber Security Strategy
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Endpoint Security, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Encryption
★ 4.6 (14) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Identity and Access Management, Cybersecurity, Cyber Attacks, Cloud Security, Cloud Computing, AI Security, Zero Trust Network Access, Governance, Compliance Management, User Provisioning, Authentications, Threat Detection, Risk Management, Artificial Intelligence
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Zero Trust Network Access, Data Access, Single Sign-On (SSO), Multi-Factor Authentication, Computer Security, Network Model
★ 4.5 (34) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months