
Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Vulnerability Assessments, Threat Detection, Security Requirements Analysis, Cybersecurity, Security Software, Security Management, Telecommuting, Cyber Risk, Cyber Security Strategy, Continuous Monitoring, Security Controls, Virtual Private Networks (VPN), Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Financial Regulation, Financial Regulations, Bank Regulations, FinTech, Financial Services, Financial Industry Regulatory Authorities, Law, Regulation, and Compliance, Mobile Banking, Regulatory Requirements, Fraud detection, Data Security, Cybersecurity, Insurance, Blockchain, Information Privacy
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Configuration, System Monitoring, Azure Active Directory, Windows Servers, Remote Access Systems
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: API Design, Restful API, Middleware, Application Deployment, Software Testing, Postman API Platform, Microsoft Azure, Cloud Development, Software Documentation, Cloud Applications
Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months