
Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Compliance Auditing, Event Monitoring, Application Security, Cyber Security Policies, Cyber Risk, Computer Security, Governance, Data Security, Information Systems Security, Infrastructure Security, Mobile Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AI Workflows, Tool Calling, OAuth, AI Orchestration, Middleware, Generative AI Agents, Interoperability, API Gateway, Agentic Workflows, Software Development Tools, LLM Application, Application Programming Interface (API), Agentic systems, Authentications, Real Time Data, Data Persistence, Context Management, Business Logic, Software Testing, Debugging
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Security Awareness, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Vulnerability Assessments, Vulnerability Management, Application Security, Security Controls, Security Testing, Authentications, Threat Management, Dependency Analysis, Application Programming Interface (API), API Design, Risk Analysis, Data Validation, Supply Chain
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: OAuth, JSON, Data Wrangling, Application Programming Interface (API), API Design, Application Security
Intermediate · Course · 1 - 4 Weeks