
Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, Network Administration, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service
Intermediate · Course · 1 - 3 Months

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Intellectual Property, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Risk Management Framework, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management
Advanced · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Security Controls, Incident Response, Automation, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Cyber Risk, Personally Identifiable Information, Security Management, ISO/IEC 27001, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Cyber Security Policies, Security Controls, Application Security
Intermediate · Specialization · 1 - 3 Months