
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Security Controls, Governance Risk Management and Compliance, Risk Management, Business Risk Management, Compliance Management, Compliance Auditing, Enterprise Risk Management (ERM), Data Security, Information Privacy, Continuous Monitoring, Auditing, Information Systems Security, Regulatory Compliance, Verification And Validation, Risk Analysis, Document Management, Scope Management, Asset Protection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Administration
Beginner · Course · 1 - 4 Weeks

Coursera
Beginner · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Data Visualization, Exploratory Data Analysis, Plot (Graphics), Statistical Analysis, Data Presentation, Ggplot2, Program Evaluation, Policy Analysis, Surveys, Data Ethics, R (Software), Data Analysis, Tidyverse (R Package), Statistical Visualization, R Programming, Statistical Methods, Public Policies, Data Visualization Software, Case Studies, Political Sciences
Intermediate · Specialization · 3 - 6 Months
O.P. Jindal Global University
Skills you'll gain: Econometrics, Surveys, Data Ethics, Environmental Laws, Sampling (Statistics), Social Sciences, Research Reports, Social Determinants Of Health, Matplotlib, Public Policies, Research Methodologies, Political Sciences, Economics, Policy, and Social Studies, Economic Development, Policy Analysis, International Relations, Diplomacy, Economics, Complex Problem Solving, Socioeconomics
Earn a degree
Degree · 1 - 4 Years

Logical Operations
Skills you'll gain: Network Troubleshooting, Network Administration, Network Security, Network Architecture, TCP/IP, Network Routers, Computer Networking, Network Routing, Virtual Local Area Network (VLAN), Dynamic Host Configuration Protocol (DHCP), Wireless Networks, Local Area Networks, Network Switches, Networking Hardware, Network Infrastructure, IT Automation, Network Protocols, Routing Protocols, Hardware Troubleshooting, Network Model
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Authentications, Role-Based Access Control (RBAC), Splunk, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Identity and Access Management, Lightweight Directory Access Protocols, Authorization (Computing), Security Controls, Data Access, User Accounts, Scripting, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, Authorization (Computing), Single Sign-On (SSO), User Accounts, Security Controls, Proxy Servers
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Security Controls, Personally Identifiable Information, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks