
Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Response, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Assurance, Digital Forensics, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Deployment, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Deployment, Cloud Computing Architecture, Cloud Computing, Cloud Services, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Security Controls, Secure Coding, Public Cloud, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: Role-Based Access Control (RBAC), Hardening, Identity and Access Management, Kubernetes, Infrastructure Security, Network Security, Firewall, Security Controls, Authorization (Computing), Linux Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Public Key Cryptography Standards (PKCS), Distributed Denial-Of-Service (DDoS) Attacks, Cyber Risk
Beginner · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Network Security, Threat Modeling, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Authorization (Computing), Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Cloud Management, Cloud Security, Cloud Computing, Cloud Infrastructure, Cloud Standards, Cloud Platforms, Private Cloud, IT Security Architecture, Security Controls, Network Security
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Intrusion Detection and Prevention, Local Area Networks, Network Routers, Security Controls, Mobile Security, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks