
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Telecommuting, Threat Modeling, Cyber Security Strategy, Security Controls, Security Strategy, Problem Management, Security Awareness, Employee Engagement
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework, Configuration Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Application Programming Interface (API), Dashboard, Data Visualization, Business Intelligence, Data Security, Systems Integration, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardening, Linux Administration, System Monitoring, Linux Commands, Performance Tuning, Linux, Systems Administration, File Management, Network Troubleshooting, Unix Commands, Debugging, Service Management, User Accounts, OS Process Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Information Systems Security, Information Assurance, Security Controls, Data Integrity, Personally Identifiable Information, Identity and Access Management, Network Security, IT Security Architecture, Authentications, Cybersecurity, Authorization (Computing), Infrastructure Security, Encryption, Enterprise Security, User Accounts, Security Awareness, Safety and Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Oracle Databases, Disaster Recovery, Operational Databases, Data Maintenance, Database Architecture and Administration, Database Management, Data Storage, Virtual Machines, Virtual Environment, Configuration Management, Scripting Languages
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
Beginner · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Network Security, Virtual Private Networks (VPN), Microsoft Azure, Firewall, Network Administration, Application Security, Network Architecture, Infrastructure Security, Load Balancing, Virtual Machines
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Microsoft SQL Servers, Data Encryption Standard, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Threat Modeling, Identity and Access Management, Firewall
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
Intermediate · Course · 1 - 4 Weeks