
Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Command-Line Interface, Network Security, Operating Systems, Information Technology Operations, Mac OS, Microsoft Windows, Information Systems Security, System Configuration, Mobile Security, System Support, Linux, Network Troubleshooting, Technical Support, Software Installation, Help Desk Support, Firewall, Malware Protection, Artificial Intelligence, Encryption
Intermediate · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Cloud Computing Architecture, Public Cloud, Cloud Security, Data Import/Export, Load Balancing, Virtual Networking, Multi-Factor Authentication, Event Monitoring, Data Storage, MySQL, Key Management, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Deployment, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Application Security, Cloud Security, Vulnerability Assessments, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Generative AI, Cloud Security, Infrastructure As A Service (IaaS), Data Loss Prevention, Cloud Storage, Virtual Machines, Containerization, Application Development, Security Management, Virtual Networking, Cloud Computing, Encryption, Malware Protection, Application Security
Intermediate · Specialization · 3 - 6 Months