
University of California, Irvine
Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, System Monitoring, Event Monitoring, Kubernetes, Continuous Monitoring, Application Security, Hardening, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Scalability, Security Controls, Authorization (Computing), Authentications, Data Access, Role-Based Access Control (RBAC), Performance Tuning, Data Governance, Test Planning, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Risk Control, Risk Management, Compliance Reporting, Risk Mitigation, Risk Analysis, Business Risk Management, Internal Controls, Continuous Monitoring, Data Management, Key Performance Indicators (KPIs), Stakeholder Communications
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Cyber Attacks, Continuous Monitoring, Enterprise Security, Security Awareness, Cyber Operations, Information Technology Operations, Automation, Systems Integration
Beginner · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Vendor Management, Business Priorities, Cyber Security Assessment, Enterprise Security, Security Management, Security Awareness, Information Systems Security, Technical Consulting, Business Risk Management, Business Communication, Strategic Leadership, Leadership and Management, Risk Management, Business Metrics, Team Leadership, Compliance Auditing, Information Technology, Artificial Intelligence and Machine Learning (AI/ML)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months