
Macquarie University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Testing, Threat Modeling, Data Security, Security Controls, Cyber Security Assessment, Cybersecurity, Security Awareness, Threat Management, Continuous Monitoring, Authorization (Computing), Encryption, Penetration Testing, Data Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

LearnKartS
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Incident Response, DevSecOps, MITRE ATT&CK Framework, Cloud Security, Threat Detection, Risk Management, Cost Management, Cyber Security Strategy, Governance, Security Controls, Vulnerability Assessments, Compliance Management, Role-Based Access Control (RBAC), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Operating Systems
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: OAuth, API Gateway, Cloud API, Application Programming Interface (API), API Design, Restful API, Secure Coding, Security Controls, Authorization (Computing), Application Security, Information Systems Security, Network Security, Data Security, JSON, Identity and Access Management, Key Management, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Test Planning
Advanced · Course · 1 - 3 Months

Skills you'll gain: Health Technology, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Management, Health Care, Cloud Security, Personally Identifiable Information, Regulatory Compliance, Information Privacy, Information Management, Data Security, Interoperability, Electronic Medical Record, Records Management, Security Controls, Information Technology
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks