
Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Centers, Network Security, Network Troubleshooting, Virtual Machines, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Cloud Infrastructure, Hardening, Network Infrastructure, Virtual Private Networks (VPN), General Networking, TCP/IP, Cloud Computing, Information Technology Operations, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Intrusion Detection and Prevention, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Security Engineering, Application Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Security Assessment, Penetration Testing, Cyber Threat Intelligence
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: Responsible AI, AI Security, Telehealth, Health Technology, Generative AI, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Healthcare Ethics, Regulatory Compliance, Health Care Procedure and Regulation, Security Strategy, Medical Privacy, Data Security, Analysis, Innovation, Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cloud Security, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Data Governance, Security Information and Event Management (SIEM), Cloud Computing Architecture, Incident Response, Identity and Access Management, Cloud Infrastructure, AWS Identity and Access Management (IAM), MITRE ATT&CK Framework, Business Continuity Planning, Cyber Threat Hunting, Data Management, Virtual Machines, System Monitoring, Network Monitoring, Zero Trust Network Access, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Computer Security Incident Management, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Information Systems Security, Network Architecture, Computer Networking, DevSecOps, Risk Management, OAuth, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months