
Skills you'll gain: Azure Active Directory, Zero Trust Network Access, Authentications, Active Directory, Identity and Access Management, Microsoft Azure, Authorization (Computing), Cybersecurity, Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, Enterprise Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Network Security, Network Monitoring, Network Troubleshooting, Security Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Test Script Development, Scripting, System Configuration
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Azure Active Directory, Authentications, Authorization (Computing), Microsoft Azure, Identity and Access Management, Active Directory, User Provisioning, Role-Based Access Control (RBAC), Enterprise Application Management, Single Sign-On (SSO), User Accounts, Cloud Security, Security Engineering, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Security Controls, Configuration Management, Package and Software Management, Cybersecurity, Identity and Access Management, Software Installation, Computer Programming, Information Technology
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Microsoft Azure, Identity and Access Management, User Provisioning, Active Directory, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Enterprise Application Management
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Secure Coding, API Testing, API Design, Application Programming Interface (API), Security Testing, Penetration Testing, Application Security, Restful API, Authentications, Exploit development, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Scenario Testing, Security Controls, Development Environment, Cybersecurity
Intermediate · Course · 1 - 3 Months