
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Detection
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Computing Architecture, Data Loss Prevention, Application Security, Cloud Services, Encryption, Security Management, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Identity and Access Management, Network Monitoring, Google Cloud Platform, Virtual Private Networks (VPN), General Networking, Network Troubleshooting, Virtual Local Area Network (VLAN), Network Security, Network Architecture, Network Routing, Cloud Computing, Cloud Security, Firewall, Key Management, Load Balancing, Cloud Storage, DevOps, Encryption, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: System Monitoring, Network Monitoring, Event Monitoring, Systems Administration, System Configuration, Continuous Monitoring, UI Components, Linux Servers, Incident Management, System Implementation, User Accounts, User Interface (UI), File Transfer Protocol (FTP), Application Programming Interface (API)
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks, User Accounts
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Management, Law, Regulation, and Compliance, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Governance, Data Science, Cybersecurity, Risk Analysis, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Vulnerability Management, Security Engineering, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Operating System Administration, Security Controls, System Configuration, Virtual Environment, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Application Security, Security Testing, Security Engineering, Threat Management, Cybersecurity, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, Test Automation, Secure Coding, Technical Communication
Intermediate · Course · 1 - 3 Months