
Skills you'll gain: Microsoft 365, Data Integration, Report Writing, IT Automation
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Salesforce, Administration, Role-Based Access Control (RBAC), Data Sharing, Security Controls, User Accounts, System Configuration, Workflow Management, Data Validation, Object-Relational Mapping, Productivity Software, Data Integrity, Data Quality, Customer Relationship Management (CRM) Software
Beginner · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Authentications, AWS Identity and Access Management (IAM), User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Data Ethics, Security Controls, Personally Identifiable Information, Data Security, Threat Management, Security Awareness, Security Management, General Data Protection Regulation (GDPR), Authorization (Computing), Incident Response, Cyber Security Policies, Role-Based Access Control (RBAC), Cyber Governance, Governance, Risk Management Framework, Generative AI
Intermediate · Course · 1 - 4 Weeks

Logical Operations
Skills you'll gain: Microsoft Access, Relational Databases, Database Design, Database Management, Data Integrity, Databases, Data Validation, Database Software, Query Languages, Microsoft 365, Data Management, Microsoft Office, Data Presentation, Productivity Software, User Interface (UI), User Interface (UI) Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Azure Active Directory, Authentications, Authorization (Computing), Microsoft Azure, Identity and Access Management, Active Directory, User Provisioning, Role-Based Access Control (RBAC), Single Sign-On (SSO), User Accounts, Cloud Security, Security Engineering, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Amazon S3, Authorization (Computing), Role-Based Access Control (RBAC), Authentications, Single Sign-On (SSO), User Accounts, Data Security, Multi-Factor Authentication, Encryption
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Security Awareness, Multi-Factor Authentication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months