
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, Cyber Security Assessment, System Testing, Firewall, Cybersecurity, Cloud Security, Exploitation techniques, Microsoft Azure, Virtual Private Networks (VPN), Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Cyber Operations, Cyber Attacks, Cyber Security Strategy, Threat Detection, Security Controls, Cyber Security Assessment, Threat Management, Intrusion Detection and Prevention, Computer Security, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Event Monitoring, Endpoint Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Hardening, Remote Access Systems, Linux Servers, Linux Administration, Linux, Linux Commands, Authentications, Security Controls, Cryptographic Protocols, Key Management, Public Key Infrastructure, Package and Software Management, Software Installation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, IT Security Architecture, DevSecOps, Security Controls, Security Information and Event Management (SIEM), AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Infrastructure Security, Cyber Security Assessment, Identity and Access Management, Cyber Security Policies, Cloud Computing, Vulnerability Management, Continuous Monitoring, Network Security, NIST 800-53, Authorization (Computing), Threat Detection, Auditing, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Cloud Technologies, IT Security Architecture, Application Security, Cloud Infrastructure, Network Security, Cloud Services, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, DevOps
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Ubuntu, Operating System Administration, Red Hat Enterprise Linux, Unix, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Network Administration, Software Installation, Package and Software Management, Authentications, Open Source Technology
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Management, Cloud Computing Architecture, Identity and Access Management, Cloud Infrastructure, AWS Identity and Access Management (IAM), Virtualization and Virtual Machines, Virtual Machines, Cloud Security, Virtualization, Cloud Deployment, Cloud Platforms, Authorization (Computing), Infrastructure As A Service (IaaS), Cloud Services, Role-Based Access Control (RBAC), User Provisioning, Authentications, Security Awareness, Cyber Threat Intelligence, Cyber Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Security Controls, Risk Management Framework
Advanced · Course · 1 - 4 Weeks