
Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Data Integration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Brute-force attacks, General Networking, Network Administration, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: API Gateway, Cloud API, Application Programming Interface (API), Capacity Management, Scalability, Application Security, Hybrid Cloud Computing, Security Controls, Data Security, Cloud Deployment, Application Deployment, Role-Based Access Control (RBAC), Development Environment, Encryption, Debugging
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Authentications, Cloud Security, Key Management, Application Deployment, Encryption, Cryptography, User Accounts
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Virtual Private Networks (VPN), Linux Servers, Ubuntu, Network Troubleshooting, Authentications, Remote Access Systems, Encryption, Network Security, Linux, Network Monitoring, Network Performance Management, Cross Platform Development
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: API Design, Back-End Web Development, Secure Coding, Data Security, Application Programming Interface (API), Restful API, IT Infrastructure, Application Security, Infrastructure Security, Data Integrity, Servers, Cloud Security, Server Administration, Web Servers, Encryption, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Open Shortest Path First (OSPF), Network Performance Management, Virtual Networking, Network Monitoring, Firewall, Network Planning And Design, Network Protocols, Infrastructure as Code (IaC), Terraform, Configuration Management, Encryption, System Configuration, Scalability
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months