
Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Cyber Engineering, Security Controls, Security Engineering, Security Architecture Review, Security Requirements Analysis, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Industrial Design
Beginner · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Scalability, Security Controls, Authorization (Computing), Authentications, Data Access, Cyber Security Policies, Role-Based Access Control (RBAC), Performance Tuning, Data Governance, Token Optimization, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft SQL Servers, Data Security, Microsoft Azure, Cloud Security, Databases, Database Management, Data Management, Data Access, Security Controls, Authorization (Computing), Role-Based Access Control (RBAC)
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Control Systems, Programmable Logic Controllers, Real-Time Operating Systems, Code Reusability, Program Development, Human Machine Interfaces, System Monitoring, System Configuration, Event Monitoring, Data Storage Technologies
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Enterprise Application Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Data Loss Prevention, Network Security, Patch Management, System Configuration, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management, Enterprise Application Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Microsoft Azure, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), IT Security Architecture, Security Controls, Multi-Factor Authentication, Authentications, Continuous Monitoring, Key Management, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Systems Development Life Cycle, Software Development Life Cycle, Systems Development, Software Development Methodologies, Project Management Life Cycle, Change Management, Project Management, System Implementation, Compliance Auditing, Internal Auditing, Software Testing, Auditing, Development Testing, Project Management Office (PMO), Internal Controls, Governance, Agile Methodology, Software Development, Software Development Tools, Risk Management
★ 4.9 (7) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Release Management
Advanced · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Microsoft Azure, Identity and Access Management, User Provisioning, Active Directory, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Service Level Agreement, Data Governance, Incident Management, Problem Management, Database Management Systems, Database Software, Asset Management, Disaster Recovery, Business Continuity Planning, Data Management, Database Management, Business Continuity, Service Level, Information Technology Operations, IT Service Management, Incident Response, Security Controls, Information Systems, IT Infrastructure, IT Management
★ 4.9 (7) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
★ 4.8 (12) · Intermediate · Course · 1 - 3 Months