
Skills you'll gain: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Governance, Security Management, Information Systems Security, Cybersecurity, Governance, Cyber Security Strategy, Cyber Risk, Information Assurance, Leadership, Change Management, Business Leadership
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Intelligence, Cloud Security, Computer Security Incident Management, Google Cloud Platform, Network Security, System Monitoring, Cloud Computing
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Information Management, Security Controls, Configuration Management, Security Engineering, Vulnerability Assessments, Security Requirements Analysis, Cloud Security, Software Development Life Cycle, Cloud Computing, System Implementation, Program Development, Change Control
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Risk Management Framework, Systems Development Life Cycle, Risk Management, NIST 800-53, Enterprise Risk Management (ERM), Operational Risk, Governance Risk Management and Compliance, Continuous Monitoring, Law, Regulation, and Compliance, Regulatory Requirements, Cyber Security Policies, Security Controls, Authorization (Computing), Cyber Security Assessment
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Single Sign-On (SSO), User Provisioning, User Accounts, Security Assertion Markup Language (SAML), Authorization (Computing), Authentications, Role-Based Access Control (RBAC), OAuth, Public Key Infrastructure, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks