
Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, System Support, Generative AI, Maintainability, Automation, Technical Support, Debugging, Anomaly Detection, System Monitoring, Software Engineering, Software Documentation
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
Beginner · Project · Less Than 2 Hours

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
Advanced · Course · 3 - 6 Months

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Package and Software Management, Linux, Command-Line Interface, Linux Servers, Operating System Administration, Linux Commands, Unix Commands, Bash (Scripting Language), Software Installation, Systems Administration, File Management, Service Management, Authorization (Computing), Shell Script, Operating Systems, Servers, Data Storage, System Monitoring, System Configuration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Prompt Engineering, Generative AI, Dimensionality Reduction, Natural Language Processing, Large Language Modeling, OpenAI, Text Mining, Applied Machine Learning, LLM Application, Statistical Machine Learning, Data Processing, Databases, Feature Engineering, Python Programming, Supervised Learning, Artificial Intelligence, Unsupervised Learning, Pandas (Python Package), Data Transformation, NumPy
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis
Intermediate · Course · 1 - 3 Months