
Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Authorization (Computing), Virtualization, Operating System Administration, Security Controls, System Configuration, Virtual Environment, Command-Line Interface, Software Installation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Azure Active Directory, Zero Trust Network Access, Authentications, Active Directory, Identity and Access Management, Microsoft Azure, Authorization (Computing), Cybersecurity, Multi-Factor Authentication, Single Sign-On (SSO), Software As A Service, Enterprise Security
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, User Provisioning, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Authentications, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Cyber Attacks, Multi-Factor Authentication, Data Governance, Key Management, Security Management, Authorization (Computing), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Cloud Management, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Solutions, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Data Security, Data Integration
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Secure Coding, Identity and Access Management, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy, Package and Software Management, Patch Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Mobile Security, System Monitoring, Network Monitoring, Security Controls, Internet Of Things, Wireless Networks, Application Security, Information Systems Security, Authorization (Computing), Cybersecurity, Identity and Access Management, Cyber Attacks, General Networking, Authentications, Cloud Security, TCP/IP, Network Protocols, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Angular, Authentications, Web Applications, Authorization (Computing), User Accounts, GitHub
Intermediate · Guided Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Key Management, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Scalability, Security Controls, Authorization (Computing), Authentications, Data Access, Cyber Security Policies, Role-Based Access Control (RBAC), Performance Tuning, Data Governance, Token Optimization, Configuration Management
Intermediate · Course · 1 - 4 Weeks