
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Solutions, Cloud Infrastructure, Cloud Computing, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Cloud Computing, Security Controls, Security Engineering, Vulnerability Assessments, System Configuration
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Network Security, Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Network Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks