Skills you'll gain: Vulnerability Assessments, Network Security, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, Threat Detection, Network Analysis, Continuous Monitoring, Security Strategy, Internet Of Things, Emerging Technologies, General Networking, Network Architecture, Enterprise Architecture, Infrastructure Architecture, Virtualization
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Test Planning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Contingency Planning, Business Continuity Planning, Computer Security Incident Management, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Information Systems Security, Infrastructure Security, Configuration Management, Data Security, Change Control, Digital Forensics
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Security Controls, Blockchain, Security Testing, Network Infrastructure, Network Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Network Protocols, Encryption
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing, Risk Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Identity and Access Management, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks