
Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, File Systems, OS Process Management, Linux, Authentications, Zero Trust Network Access, Linux Servers, Remote Access Systems, Data Security, Authorization (Computing), User Accounts, Network Security, Linux Commands, User Provisioning, Operating System Administration, IT Security Architecture
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

Intermediate · Course · 1 - 3 Months

Skills you'll gain: Disaster Recovery, Hardware Architecture, Computer Hardware, Database Management, Relational Databases, Computer Systems, Databases, Computer Architecture, Cybersecurity, Operating Systems, Cyber Attacks, SQL, TCP/IP, Information Technology, Database Systems, General Networking, Information Systems Security, Cyber Security Policies, Networking Hardware, Security Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Cloud Computing, Linux, Linux Commands, Linux Administration, Cloud Computing Architecture, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Virtual Machines, Firewall, Virtualization, Knowledge of Apple Software, File Management, User Accounts
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Application Security, Security Testing, Security Strategy, Information Systems Security, Security Engineering, Security Controls, Software Architecture, Software Development Methodologies, Software Development Life Cycle, Business Strategies, Penetration Testing, Compliance Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Network Security, Linux, Linux Administration, Security Controls, Hardening, Ubuntu, Linux Commands, File Management, Authorization (Computing), File Systems, System Configuration, Endpoint Security, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardening, Incident Response, Vulnerability Assessments, Cyber Security Assessment, Security Strategy, Security Controls, Computer Security Incident Management, Infrastructure Security, Security Testing, Control Systems, Information Systems Security, Penetration Testing, Cyber Security Strategy, Cyber Attacks, Risk Analysis, Operational Risk, Data Security, Risk Management Framework, Risk Management, Operational Databases
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Computer Security Incident Management, Cyber Threat Intelligence, Network Planning And Design, Malware Protection, Information Technology Architecture
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Security Controls, Virtual Machines, Enterprise Application Management, Virtualization, Firewall, Virtualization and Virtual Machines, Intrusion Detection and Prevention, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks