
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Role-Based Access Control (RBAC), Cloud Management, Google Cloud Platform, Authorization (Computing), Cloud Storage
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Responsible AI, Security Strategy, Data Security, Information Systems Security, Threat Modeling, Security Controls, Infrastructure Security, Risk Management Framework, Information Privacy, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Cloud Management, Cloud Computing, User Accounts, Cloud Infrastructure, Public Cloud, Cloud Services, Servers, Linux Servers, Cloud Security, Docker (Software), Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Microsoft Azure, Azure Active Directory, Identity and Access Management, Solution Architecture, Data Governance, Data Management, Cloud Security, Cloud Computing Architecture, System Monitoring, Cloud Computing, Key Management
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Role-Based Access Control (RBAC), Identity and Access Management, Authorization (Computing), Cloud Management, Google Cloud Platform, User Accounts
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks