
Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Cloud Computing, Cybersecurity, Network Architecture, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN)
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Information Systems Security, Patch Management, Network Monitoring, Data Security, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Apple software proficiency, Microsoft Intune (Mobile Device Management Software), Supervision
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Information Systems Security, Firewall, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Software-Defined Networking, Identity and Access Management, Authorization (Computing), Scripting, Authentications, Automation, Encryption
Intermediate · Course · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks