
Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Intermediate · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, System Monitoring, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Threat Hunting, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Detection, Malware Protection, Cyber Attacks, Cyber Engineering
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Mac OS, Application Lifecycle Management, Endpoint Security, Cloud Deployment, iOS Development, Web Servers, Mobile Development Tools, Single Sign-On (SSO), Test Planning
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Wireless Networks, Network Administration, Virtual Machines, Virtualization, Network Troubleshooting, Network Security, Cloud Computing, Computer Networking, Virtual Private Networks (VPN), Mobile Security, Firewall, Hardware Troubleshooting, Android (Operating System), Apple iOS, Systems Administration, Multi-Factor Authentication, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Computer Security Incident Management, Mobile Security, Security Awareness, Malware Protection, Operating System Administration, Email Security, Android (Operating System), Data Maintenance, Multi-Factor Authentication, System Configuration, Apple iOS, Hardware Troubleshooting, Network Administration, Authentications, Change Control
Beginner · Course · 1 - 3 Months

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Authentications, Unit Testing, Application Security, Security Testing, Authorization (Computing), Secure Coding, Identity and Access Management, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, Authorization (Computing), Single Sign-On (SSO), User Accounts, Security Controls, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Operating Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Security Strategy, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Cloud Deployment
Intermediate · Course · 1 - 4 Weeks