
Skills you'll gain: IT Security Architecture, Endpoint Security, Zero Trust Network Access, Application Security, Security Strategy, Hardening, Microsoft Servers, Data Security, Security Management, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: White-Box Testing, Risk Analysis, Software Testing, Code Coverage, Test Case, Test Tools, Test Planning, Risk Management, Software Quality Assurance
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Infrastructure, Network Performance Management, Authentications, Identity and Access Management, Encryption, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Wireless Networks
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Security Testing, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Cloud Computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Security, Firewall, Ansible, Network Performance Management, Network Infrastructure, Network Protocols, Security Controls, Event Monitoring, Puppet (Configuration Management Tool), IT Automation, Chef (Configuration Management Tool), Real Time Data, JSON, Automation, Identity and Access Management, Restful API, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Vulnerability Scanning, Public Cloud
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, User Provisioning, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking, User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Exploitation techniques, Data Sharing
Beginner · Course · 1 - 3 Months