
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Cloud Security, Generative AI, Vulnerability Assessments, System Configuration, Security Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Threat Detection, Vulnerability Assessments, Multi-Cloud, Cloud Security, Security Controls, Threat Management, Google Cloud Platform, Cloud Management, Enterprise Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Security Information and Event Management (SIEM), Continuous Monitoring, Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Computer Security Incident Management, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, AWS Identity and Access Management (IAM), Encryption, Network Security, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Terraform, Cloud Engineering, Cloud Computing, Infrastructure as Code (IaC), Cloud Management, Virtual Machines, Load Balancing, Network Infrastructure, Virtualization and Virtual Machines, Data Management, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks