Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Architecture Review, Security Testing, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring
Mixed · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Business Continuity, Data Security, Business Continuity Planning, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Data Validation, Data Management, Compliance Management, Risk Mitigation, Data Governance, Technology Strategies, Information Assurance, Security Controls, Law, Regulation, and Compliance, Project Risk Management, Auditing
★ 4.3 (24) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Business Continuity, Cryptographic Protocols, Network Security, Cryptography, Encryption, User Provisioning, Security Management, Penetration Testing, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, Cyber Operations, Data Management, Vulnerability Management, Software Development Methodologies, Cybersecurity, Configuration Management
★ 4.8 (157) · Beginner · Specialization · 3 - 6 Months

John Wiley & Sons
Skills you'll gain: Cyber Threat Intelligence, Incident Response, Computer Security Incident Management, Security Management, Security Controls, Incident Management, Business Continuity Planning, Threat Management, Risk Management, Threat Detection, Risk Management Framework, Disaster Recovery, Cybersecurity, Security Testing, Cyber Security Strategy, IT Security Architecture, Security Strategy, Compliance Management, Security Awareness, Business Continuity
Intermediate · Specialization · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Software Development Life Cycle, Productivity Software, Risk Management Framework, digital literacy, Systems Design, Network Security, Computer Hardware, Agile Project Management, Hardware Architecture, Agile Software Development, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Productivity
★ 4.6 (341) · Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Incident Management, Security Architecture Review, Application Security, Identity and Access Management, Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Systems Architecture, Security Management, Security Engineering, Zero Trust Network Access, Security Awareness, Risk Management Framework, Cybersecurity, Enterprise Architecture
★ 4.1 (7) · Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Disaster Recovery, Hardware Architecture, Computer Hardware, Database Management, Relational Databases, Computer Systems, Databases, Computer Architecture, Cybersecurity, Operating Systems, Cyber Attacks, SQL, TCP/IP, Information Technology, Database Systems, General Networking, Information Systems Security, Cyber Security Policies, Networking Hardware, Security Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
★ 4.8 (26K) · Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
★ 4.4 (11) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Operating System Administration, OSI Models, User Accounts, Group Policy, Security Management, Ubuntu, System Monitoring, Cyber Security Policies, IT Management, Systems Administration, Cybersecurity
★ 4.6 (1.9K) · Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Data Security, Threat Detection, Cybersecurity, Cyber Attacks, Cyber Risk, Data Management, Security Controls, Cyber Governance, Security Management, Encryption, Security Software, Cryptography, Data Sharing, Security Strategy, Network Security, Data Access, Risk Modeling, Statistical Methods
★ 4.2 (6) · Beginner · Course · 1 - 3 Months