
Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Cyber Threat Hunting, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Security Controls, Performance Tuning, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Personally Identifiable Information, Application Performance Management
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Application Security, Cloud Security, Vulnerability Assessments, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Cloud Management, Google Cloud Platform, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Network Security, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, General Data Protection Regulation (GDPR), Information Privacy
Beginner · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Identity and Access Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Security Requirements Analysis, Security Engineering, Security Controls, Network Security, Encryption, Firewall, Continuous Monitoring, CI/CD, Key Management, Virtual Networking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months