
Skills you'll gain: Microsoft Azure, Cloud Security, Data Governance, Data Management, Data Security, Secure Coding, Cloud Applications, Application Security, Identity and Access Management, Key Management, Multi-Factor Authentication, Encryption, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Management, Google Cloud Platform, Enterprise Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS SageMaker, AWS Kinesis, Amazon Redshift, Cloud Security, MLOps (Machine Learning Operations), Amazon S3, Amazon CloudWatch, AWS Identity and Access Management (IAM), Model Deployment, Real Time Data, Feature Engineering, Data Storage, Data Security, Encryption, Key Management
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Azure Active Directory, Authentications, Microsoft Azure, Authorization (Computing), Network Security, Virtual Private Networks (VPN), Identity and Access Management, Firewall, Active Directory, Cloud Security, User Provisioning, Security Management, Role-Based Access Control (RBAC), Virtual Networking, Kubernetes, Single Sign-On (SSO), User Accounts, Data Security, Data Access, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 3 Months

Board Infinity
Skills you'll gain: Secure Coding, Cloud Deployment, Database Development, Maintainability, Server Side, Authentications
Intermediate · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Data Integrity, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, UI Components, Email Security, Active Directory
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Cloud Security, Authentications, Google Cloud Platform, Cloud Computing, Authorization (Computing), Virtual Private Networks (VPN), Network Security, Firewall, Virtual Networking, Data Security, Load Balancing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Troubleshooting, Proxy Servers, Network Monitoring, Cloud Security, Intrusion Detection and Prevention, Firewall, Google Cloud Platform, Threat Detection, Network Analysis, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Kubernetes, Google Cloud Platform, Security Controls, Data Security, Application Security, Role-Based Access Control (RBAC), Data Access, API Gateway, Cloud Storage, Authorization (Computing), Application Programming Interface (API), Web Applications, Authentications, Vulnerability Scanning, Data Encryption Standard, Key Management
Intermediate · Course · 1 - 3 Months