
Skills you'll gain: AWS Kinesis, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, Identity and Access Management, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Advancing Women in Tech
Skills you'll gain: Cyber Risk, Business Strategies, Technical Consulting, Business Communication
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Information Systems Security, Security Management, Cyber Threat Intelligence, Cyber Security Policies, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication
Beginner · Course · 1 - 3 Months

Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Supplier Management, Cyber Security Strategy, Influencing, Risk Management, Performance Measurement, Business Relationship Management, Business Metrics, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon S3, Amazon CloudWatch, Data Encryption Standard, AWS CloudFormation, Infrastructure as Code (IaC), Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months