
Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Linux, File Systems, Unix Commands, Scripting, Command-Line Interface, Ubuntu, Linux Administration, Unix, Operating Systems, Network Protocols, OS Process Management, Automation, Software Installation
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Deepseek, LangChain, Generative AI, LLM Application, Tool Calling, AI Workflows, AI Orchestration, Prompt Engineering, Automation, Data Integration, Cross Platform Development, Systems Integration
Intermediate · Course · 1 - 4 Weeks
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, Cloud Security, Security Management, DevOps, Data Access, Data Management, Server Administration, Data Governance, Test Planning, System Configuration, Servers, Command-Line Interface
Intermediate · Specialization · 1 - 3 Months

Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Computing Platforms, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Application Security, Data Security, Information Privacy, Servers, Cloud Computing, Network Administration, Encryption, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, Authorization (Computing), Single Sign-On (SSO), User Accounts, Security Controls, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months