
Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cybersecurity, Google Cloud Platform, Authentications, Network Security, Authorization (Computing), Identity and Access Management, Information Privacy, Data Governance, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, System Monitoring, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, Incident Management, Automation
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Security Management, Human Factors (Security), Information Privacy, Key Management, Cyber Governance, Application Security, Infrastructure Security, Threat Modeling, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cryptography, ISO/IEC 27001, Network Security, Malware Protection, Incident Management, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Malware Protection, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management
Beginner · Course · 3 - 6 Months

Skills you'll gain: Kubernetes, Cloud Security, Cloud-Native Computing, Network Security, Infrastructure Security, Application Security, Role-Based Access Control (RBAC), Cyber Security Policies, Verification And Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Cloud Platforms, Private Cloud, IT Security Architecture, Security Controls, Network Security
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Virtual Networking, Security Management, Cyber Security Assessment, System Configuration, Simulations, Configuration Management, Cybersecurity, Cloud Security
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Kubernetes, OAuth, Role-Based Access Control (RBAC), Application Security, Cloud Storage, Authorization (Computing), Data Security, Vulnerability Scanning, Data Encryption Standard, Key Management
Intermediate · Course · 1 - 3 Months