
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Amazon S3, Security Assertion Markup Language (SAML), Authorization (Computing), OAuth, Role-Based Access Control (RBAC), User Provisioning, Authentications, Single Sign-On (SSO), Data Storage Technologies, Cloud Storage, User Accounts, Data Security, Multi-Factor Authentication, Encryption
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Linux, Security Controls, Hardening, Authentications, Network Security, Linux Commands, System Configuration, Servers, Computer Security, Server Administration, Encryption, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Cloud Management, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Solutions, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Data Security, Data Integration
★ 4.9 (16) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
★ 4.6 (99) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Ansible, IT Automation, Infrastructure as Code (IaC), Linux Commands, Automation, Debugging, YAML, Scripting, Command-Line Interface, Encryption, Amazon Web Services, Code Reusability, Package and Software Management, Software Installation, Configuration Management, File Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Compliance Training, Risk Mitigation, Risk Management Framework, Business Risk Management, Cyber Governance, Regulatory Compliance, Data Security, Compliance Auditing, Security Testing, Cyber Risk, Cyber Security Policies, Governance, Regulation and Legal Compliance, Continuous Monitoring, Law, Regulation, and Compliance
★ 4.9 (7) · Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cyber Security Policies, Security Controls, Infrastructure Security, Threat Detection, System Monitoring, Linux Administration, Linux, Linux Commands, Data Integrity
★ 3.9 (62) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.7 (19) · Mixed · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, Network Monitoring, Virtualization
★ 4.7 (10) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Django (Web Framework), GitHub, Version Control, Git (Version Control System), User Experience Design, Secure Coding, User Interface (UI), Web Development, Application Security, Development Environment, Authentications, Web Applications, Integrated Development Environments, User Accounts, Authorization (Computing)
★ 4.7 (13) · Intermediate · Guided Project · Less Than 2 Hours

Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Intrusion Detection and Prevention, Disaster Recovery, Remote Access Systems, Network Administration, Data Integrity, Network Monitoring, Cyber Security Policies, Security Controls, System Configuration, Network Troubleshooting, Security Management, System Monitoring, Active Directory
Beginner · Course · 1 - 4 Weeks