
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Rust (Programming Language), Command-Line Interface, Build Tools, Encryption, Package and Software Management, Application Development, Cryptography, Software Engineering
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Computer Security Incident Management, Vulnerability Assessments, Cloud Computing Architecture, Endpoint Detection and Response, Cloud Computing, Intrusion Detection and Prevention, Event Monitoring, Cybersecurity, Security Management, Cyber Attacks, Data Security, Security Strategy, User Provisioning, Infrastructure Security, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Event Monitoring, Key Management, Cloud Management, Computer Security Incident Management, Vulnerability Management, System Monitoring, Cyber Security Assessment, Cyber Security Policies, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Multi-Cloud, IT Automation
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: OS Process Management, Operating Systems, System Programming, Performance Tuning, Data Structures, Event-Driven Programming, Data Access
★ 4.4 (36) · Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis
★ 4.6 (13) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Scalability, Security Controls, Authorization (Computing), Authentications, Data Access, Cyber Security Policies, Role-Based Access Control (RBAC), Performance Tuning, Data Governance, Token Optimization, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Unity Engine, Animation and Game Design, Video Game Development, Data Structures, Computer Graphics, Linear Algebra, Advanced Mathematics, Applied Mathematics, Algorithms
Advanced · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Data Security, Security Management, Vulnerability Management, Firewall, Vulnerability Assessments, Vulnerability Scanning, Key Management, User Provisioning, Role-Based Access Control (RBAC), Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Rust (Programming Language), Data Structures, Code Reusability, Package and Software Management, Memory Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Information Technology, Security Software, Malware Protection, Data Security, Encryption, Security Awareness, Endpoint Security, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: OAuth, Google Cloud Platform, Identity and Access Management, Cloud Security, Cloud Deployment, Cloud Management, Role-Based Access Control (RBAC), Authentications, User Accounts, Servers, System Configuration
Beginner · Project · Less Than 2 Hours