
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Cloud API, Malware Protection, Email Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Security Engineering, Network Security, IT Security Architecture, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Network Routing, Linux Commands, Proxy Servers, Linux, Internet Of Things
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Continuous Monitoring, Application Security, Vulnerability Management, Threat Management, Data Security, Security Controls, System Monitoring, Event Monitoring, Security Management, Infrastructure Security, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Enterprise Security, Information Privacy
Beginner · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Security Software, Cyber Security Policies, Cyber Security Strategy, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Firewall, Exploitation techniques, AI Security, Information Assurance, Multi-Factor Authentication, Encryption, Network Protocols
Beginner · Course · 1 - 3 Months

Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Data Governance, Personally Identifiable Information, ISO/IEC 27001, Security Controls, Data Processing, Regulatory Compliance, Compliance Management, Data Security, Law, Regulation, and Compliance, Data Import/Export, Data Access, Informed Consent, Risk Management Framework, Risk Management
Beginner · Course · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, IT Security Architecture, Security Architecture Review, Network Security, Cyber Security Strategy, Data Security, Security Controls, Threat Management, Security Strategy, Vulnerability Management, Incident Response, Vulnerability Assessments, Data Integrity, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Endpoint Security, Zero Trust Network Access, Cybersecurity, Cyber Attacks, Incident Response, Endpoint Detection and Response, Cyber Security Policies, Security Strategy, Identity and Access Management, Disaster Recovery, Cyber Risk, AI Security, Data Security, Cyber Threat Hunting, IT Security Architecture, Malware Protection, Network Security, Security Controls, Security Awareness
Intermediate · Course · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
Intermediate · Course · 1 - 3 Months