
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Identity and Access Management, Authorization (Computing), Payment Card Industry (PCI) Data Security Standards, Data Security, Security Engineering, Cloud Computing Architecture, Network Security, Encryption, Firewall, Continuous Monitoring, CI/CD, Key Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Private Cloud, IT Security Architecture, Security Controls, Network Security, Incident Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, Endpoint Detection and Response, Security Management, Infrastructure Security, Microsoft Servers, Threat Detection, Information Systems Security, Security Information and Event Management (SIEM), Windows Servers, System Monitoring, Payment Card Industry (PCI) Data Security Standards, Configuration Management, Virtual Machines, Disaster Recovery
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS SageMaker, AWS Kinesis, Amazon Redshift, Cloud Security, MLOps (Machine Learning Operations), Amazon S3, Amazon CloudWatch, AWS Identity and Access Management (IAM), Data Pipelines, Real Time Data, Feature Engineering, Data Storage, Data Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks