
Skills you'll gain: Linux, Linux Administration, Linux Commands, Linux Servers, Shell Script, Unix, Unix Shell, Systems Administration, Unix Commands, Command-Line Interface, Patch Management, Scripting Languages, Package and Software Management, Virtualization and Virtual Machines, File Systems, File Management, Data Storage, Security Controls, User Accounts, Authorization (Computing)
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Change Control, Project Controls, Scope Management, Project Risk Management, Project Performance, Change Management, Project Management, Stakeholder Management, Management Reporting, Risk Analysis, Planning, Project Documentation, Stakeholder Communications, Strategic Communication, Leadership and Management, Business Risk Management, Communication
Mixed · Course · 1 - 3 Months

EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Data Security, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Information Systems Security, Data Validation, Compliance Management, Risk Mitigation, Data Governance, Information Assurance, Security Controls, Law, Regulation, and Compliance, Auditing, Data Integrity, Personally Identifiable Information, Identity and Access Management, Business Continuity
Intermediate · Specialization · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Threat Detection, Network Security, Data Integrity, Data Storage, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Infrastructure, Computer Programming, Artificial Intelligence, Mockups, Network Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Medical Privacy, Information Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Governance, Security Management, Computer Security Incident Management, Personally Identifiable Information, Law, Regulation, and Compliance, Data Security, Governance, Information Assurance, Document Management, Security Controls, Threat Management, Health Information Management, General Data Protection Regulation (GDPR), Compliance Management, Regulatory Compliance, Training Programs, Compliance Training
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Responsible AI, Generative AI, Google Cloud Platform, Cloud Security, Cybersecurity, Artificial Intelligence, Technical Communication
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months