
Skills you'll gain: Microsoft Copilot, Microsoft Power Automate/Flow, Microsoft Power Platform, Microsoft 365, AI Enablement, Threat Detection, Compliance Management, AI Security, Workflow Management, Automation, Incident Response
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management Framework, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Data Security, Computer Security, Enterprise Security, Risk Analysis, Threat Detection, Infrastructure Security, Information Assurance
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Risk Management Framework, Cyber Security Strategy, Cyber Threat Intelligence, Threat Modeling, Security Strategy, Security Awareness, Cybersecurity, Security Engineering, IT Security Architecture, Zero Trust Network Access, Threat Management, Human Factors (Security), Security Controls, Threat Detection, Network Security, Information Systems Security, Incident Response, Enterprise Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Governance Risk Management and Compliance, Risk Management, Business Risk Management, Compliance Management, Compliance Auditing, Enterprise Risk Management (ERM), Data Security, Information Privacy, Continuous Monitoring, Auditing, Information Systems Security, Regulatory Compliance, Verification And Validation, Risk Analysis, Document Management, Scope Management, Asset Protection
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Compliance Auditing, Event Monitoring, Application Security, Cyber Security Policies, Cyber Risk, Computer Security, Governance, Data Security, Information Systems Security, Infrastructure Security, Mobile Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Security Controls, Personally Identifiable Information, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
Beginner · Course · 1 - 3 Months