
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Infrastructure Security, Cloud-Native Computing, Hardening, Network Security, Containerization, Security Controls, Cyber Security Policies, Authorization (Computing), Identity and Access Management, Threat Detection, Verification And Validation
Advanced · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Incident Management, Data Centers, Computer Security Incident Management, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, IT Security Architecture, Security Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Information Systems Security, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, DevOps, System Configuration, IT Automation
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Vendor Relationship Management, Supplier Risk Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Risk Mitigation, Computer Security Awareness Training, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, Cybersecurity, Mergers & Acquisitions, Due Diligence
Mixed · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, Network Monitoring, Virtualization
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Unix Commands, Unix Shell, Unix, Shell Script, Command-Line Interface, grep, Scripting Languages, Dataflow, Code Reusability, Software Documentation
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Scanning, Vulnerability Assessments, Cloud Computing, Vulnerability Management, Security Management, Infrastructure Security, Security Controls, Google Cloud Platform, System Configuration, Configuration Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Vulnerability Scanning, Public Cloud
Intermediate · Project · Less Than 2 Hours

Coursera
Skills you'll gain: Linux Commands, Linux, Command-Line Interface, File Management, Unix Shell, Linux Administration, Package and Software Management, DevOps
Beginner · Guided Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Security Management, Cyber Governance, IT Management, Cybersecurity, Cyber Security Strategy, Security Strategy, Key Performance Indicators (KPIs), Leadership and Management, Internal Communications, Leadership, Performance Metric, Program Management, Communication, Stakeholder Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Ansible, Red Hat Enterprise Linux, Linux Administration, Hardening, Linux Commands, Linux, Linux Servers, Security Controls, Authorization (Computing), Containerization, Computer Security, System Configuration, Identity and Access Management, Context Management
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months