
Skills you'll gain: Mac OS, Cyber Threat Intelligence, Network Security, Malware Protection, Threat Management, Endpoint Security, Threat Detection, Knowledge of Apple Software, Security Strategy, Security Controls, Security Awareness, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Command-Line Interface
★ 4.6 (123) · Mixed · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Security Awareness, Cyber Risk, Remote Access Systems, Cyber Governance, Telecommuting, Endpoint Security, Mobile Security, Incident Management, Security Controls, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management, Virtual Private Networks (VPN)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Authentications, OAuth, Threat Management, Software Testing, Development Testing, Software Development Life Cycle, Unit Testing, Security Testing, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Databases, Software Development, Security Software, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity
Intermediate · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring
★ 4.7 (459) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Operations, Penetration Testing, Cybersecurity, Exploitation techniques, Authentications, Scripting, Python Programming, Data Access, Identity and Access Management, Network Protocols
★ 4.6 (27) · Mixed · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Management, Cloud Security, Vulnerability Scanning, Vulnerability Assessments, Cloud Computing, Vulnerability Management, Security Management, Infrastructure Security, Security Controls, Google Cloud Platform, System Configuration, Configuration Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Enterprise Security, Threat Detection, Data Loss Prevention, Network Analysis
★ 5 (7) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Security Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Vulnerability Management, Computer Security Awareness Training, Incident Response, Security Software, Incident Management, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation, Human Factors
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
★ 4.8 (12) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Vulnerability Scanning, Public Cloud
Intermediate · Project · Less Than 2 Hours

Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Information Technology Operations, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Configuration Management, Continuous Monitoring, Vulnerability Management, Digital Forensics
★ 4.8 (22) · Intermediate · Course · 1 - 4 Weeks