
University of California, Irvine
Skills you'll gain: Vendor Management, Vendor Relationship Management, Supplier Risk Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Risk Mitigation, Computer Security Awareness Training, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, Cybersecurity, Mergers & Acquisitions, Due Diligence
★ 4.8 (51) · Mixed · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), AI Security, Security Management, Continuous Monitoring, Threat Detection, Threat Management, Enterprise Security, Cyber Security Strategy, Computer Security Incident Management, Incident Response, Malware Protection, AI Integrations, Automation, Artificial Intelligence and Machine Learning (AI/ML)
★ 4.7 (229) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, LLM Application, Cyber Security Assessment, Large Language Modeling, Continuous Monitoring, Security Testing, Responsible AI, Threat Modeling, Vulnerability Assessments, Prompt Engineering, Security Controls, Vulnerability Scanning, Security Strategy, AI Personalization, Exploitation techniques, System Implementation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Event Monitoring, Key Management, Cloud Management, Computer Security Incident Management, Vulnerability Management, System Monitoring, Cyber Security Assessment, Cyber Security Policies, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, IT Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Cyber Engineering, Security Controls, Security Engineering, Security Architecture Review, Security Requirements Analysis, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Industrial Design
Beginner · Course · 1 - 3 Months

Coursera
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Servers, Linux Commands, Network Administration, Cryptography, User Accounts, Key Management, Brute-force attacks
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cyber Security Policies, Security Controls, Infrastructure Security, Threat Detection, System Monitoring, Linux Administration, Linux, Linux Commands, Data Integrity
★ 3.9 (62) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Management, Cloud Security, Security Management, Data Storage, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Security Controls, Continuous Monitoring, Key Management, Computer Security Incident Management, Incident Response, Threat Detection, Virtual Machines, Incident Management
★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security
★ 4.8 (26) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Computer Security Incident Management, Vulnerability Assessments, Cloud Computing Architecture, Endpoint Detection and Response, Cloud Computing, Intrusion Detection and Prevention, Event Monitoring, Cybersecurity, Security Management, Cyber Attacks, Data Security, Security Strategy, User Provisioning, Infrastructure Security, Mobile Security
Intermediate · Course · 1 - 4 Weeks