
Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, System Monitoring, Network Protocols, Security Controls, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Network Switches, Real Time Data, Authentications, Scripting, JSON, Automation, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Scalability, Network Security, System Monitoring, Network Monitoring, Continuous Monitoring, Capacity Management, Application Performance Management, Performance Tuning
Advanced · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Malware Protection, Network Security, Cybersecurity, Cyber Attacks, Information Systems Security, Intrusion Detection and Prevention, Penetration Testing, Firewall, Hardening, Threat Detection, Brute-force attacks, Internet Of Things, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Management, Network Analysis, AI Security, Network Security, Network Monitoring, NIST 800-53, Network Protocols, Cloud Security
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Cloud Services, AI Security, Security Strategy, Cloud Computing Architecture, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Security Management, Threat Detection, Cloud Management, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Security Assessment, Cyber Security Strategy, Risk Management, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cybersecurity
Advanced · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks