
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Virtual Networking, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Prompt Engineering, LangChain, LLM Application, Emerging Technologies, AI Orchestration, AI Workflows, AI Security, AI Enablement, OpenAI, ChatGPT, Computer Programming Tools, Software Development Tools, Responsible AI, Artificial Intelligence, General Networking, Cybersecurity, Network Administration, Software Development, Network Security
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Centers, Network Security, Network Troubleshooting, Virtual Machines, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Cloud Infrastructure, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Advanced · Course · 1 - 3 Months

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, System Monitoring, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cybersecurity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks