
Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating Systems, Network Security, Microsoft Windows, Command-Line Interface, Systems Administration, System Support, Unix, Mac OS, System Configuration, Unix Commands, Network Troubleshooting, Linux, Firewall, Information Technology, Software Installation, Technical Support, Help Desk Support, Malware Protection, Mobile Security, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Real Time Data, Model Deployment, Anomaly Detection, Artificial Intelligence and Machine Learning (AI/ML), AI Security, Telecommunications, Tensorflow, Artificial Intelligence, Emerging Technologies, Network Performance Management, Generative AI, Generative AI Agents, Wireless Networks, Computer Networking, Network Architecture, Responsible AI, Digital Communications, Network Protocols, System Design and Implementation, Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Network Administration, Infrastructure Security, Encryption, Cloud Computing, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Email Security, Application Security, Human Factors (Security), Network Infrastructure, Network Protocols, Local Area Networks, Data Security, Authentications, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cloud Security, Identity and Access Management, User Accounts, Authorization (Computing), Payment Card Industry (PCI) Data Security Standards, Data Security, Role-Based Access Control (RBAC), Security Engineering, Cloud Standards, Security Controls, Network Security, Encryption, Firewall, Continuous Monitoring, CI/CD, Key Management, Virtual Networking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Assessments, Vulnerability Management, Security Management, Security Controls, Google Cloud Platform, Configuration Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux
Beginner · Course · 1 - 3 Months