
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Endpoint Security, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Encryption
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Cryptographic Protocols, Cybersecurity, Encryption, Security Controls, Proxy Servers, Information Privacy, Servers, Communication Systems, Web Servers, Network Routing, Network Analysis, Cloud Hosting, Cloud Deployment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Active Directory, Azure Active Directory, Group Policy, Hybrid Cloud Computing, Microsoft Servers, Windows Servers, User Accounts, User Provisioning, Windows PowerShell, Microsoft Azure, Identity and Access Management, Cloud Deployment, IT Infrastructure, Cloud-Based Integration, Authentications, Configuration Management, Security Controls
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Google App Engine, Cloud Deployment, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Security Controls, Identity and Access Management, Cloud Computing, Network Security
Intermediate · Project · Less Than 2 Hours

Whizlabs
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, User Accounts, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google App Engine, Authentications, Application Deployment, Cloud Deployment, Identity and Access Management, Google Cloud Platform, Cloud Applications, Authorization (Computing), User Accounts, Cryptography, Python Programming
Beginner · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: User Provisioning, User Accounts, Cloud Management, Mobile Security, Cloud Computing, Security Controls, Identity and Access Management, Cloud Security, Authentications, Security Assertion Markup Language (SAML), Cyber Security Policies, Single Sign-On (SSO), System Configuration, Google Workspace, Event Monitoring
Beginner · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Single Sign-On (SSO), User Provisioning, User Accounts, Security Assertion Markup Language (SAML), Authorization (Computing), Authentications, Role-Based Access Control (RBAC), OAuth, Key Management, Cryptographic Protocols, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Azure Active Directory, Authentications, Authorization (Computing), Microsoft Azure, Identity and Access Management, Active Directory, User Provisioning, Role-Based Access Control (RBAC), Enterprise Application Management, Single Sign-On (SSO), User Accounts, Cloud Security, Security Engineering, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Information and Event Management (SIEM), Azure Active Directory, Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cyber Attacks, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Computer Security Incident Management, Endpoint Security, Cloud Standards, Threat Detection, Event Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks