
Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Data Security
Intermediate · Course · 1 - 4 Weeks

Atlassian
Skills you'll gain: Git (Version Control System), Version Control, GitHub, Bitbucket, Software Configuration Management, Command-Line Interface, Code Review, Collaborative Software
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Continuous Monitoring, Firewall, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, System Monitoring, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, Incident Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Mobile Security, System Monitoring, Network Monitoring, Security Controls, Internet Of Things, Wireless Networks, Application Security, Information Systems Security, Continuous Monitoring, Authorization (Computing), Cybersecurity, Identity and Access Management, Cyber Attacks, General Networking, Authentications, Cloud Security, TCP/IP, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Network Protocols, Data Ethics, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management Framework, Authentications, IT Management, Security Management, Identity and Access Management, Security Controls, Authorization (Computing), Security Awareness, Single Sign-On (SSO), Data Ethics, Computer Security Awareness Training, Multi-Factor Authentication, Change Control
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months