
Whizlabs
Skills you'll gain: Network Security, Virtual Private Networks (VPN), Microsoft Azure, Firewall, Virtual Networking, Application Security, Cloud Security, Identity and Access Management, Infrastructure Security, Load Balancing
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Virtual Networking, Virtual Private Networks (VPN), Security Controls, Cloud Security, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: CI/CD, Continuous Deployment, Application Deployment, Cloud Deployment, Restful API, Middleware, Continuous Integration, Software Testing, API Design, Azure DevOps, Postman API Platform, API Testing, .NET Framework, Microservices
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Personally Identifiable Information, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Enterprise Risk Management (ERM), Business Risk Management, Security Information and Event Management (SIEM), Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Security Management, ISO/IEC 27001, Security Controls, Information Systems Security, Risk Management, Risk Analysis, Security Strategy, Cyber Governance, Threat Modeling, NIST 800-53, Compliance Management, Regulatory Requirements
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Threat Modeling, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Security Awareness, Change Control, Computer Security Awareness Training, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: NoSQL, Database Architecture and Administration, Cloud Applications, Database Systems, Data Store, PostgreSQL, Relational Databases, Application Deployment, Cloud Deployment, Database Design, Distributed Computing, SQL, Scalability, JSON
Intermediate · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Public Key Cryptography Standards (PKCS), Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Fraud detection, Verification And Validation
Beginner · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Computer Security Incident Management, Cyber Security Policies, Cyber Security Assessment, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, AI Security, Exploit development, Network Security, Cyber Security Assessment, Exploitation techniques, Open Web Application Security Project (OWASP), Application Security, Computer Security, Unix, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Web Applications, Server Side, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months