
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Vulnerability Assessments, Identity and Access Management, Asset Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon CloudWatch, Data Encryption Standard, AWS CloudFormation, IT Automation, Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Assessments, Vulnerability Management, Security Management, Security Controls, Google Cloud Platform, Configuration Management
Beginner · Project · Less Than 2 Hours

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
Beginner · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Application Security, Cloud Computing, Cloud Infrastructure, Cloud Applications, Cloud Platforms, Cloud Development, Identity and Access Management, Data Integrity, Secure Coding, Private Cloud, Security Awareness, Data Centers, Data Management, Personally Identifiable Information, IT Security Architecture, Security Controls, General Data Protection Regulation (GDPR), Service Level
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, Operating System Administration, User Accounts, Group Policy, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Servers, Computer Security, System Configuration, Encryption
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Information Systems Security, Multi-Factor Authentication, Computer Security
Beginner · Course · 1 - 4 Weeks