
Skills you'll gain: Digital Forensics, Incident Response, Computer Security Incident Management, Threat Detection, Incident Management, Cybersecurity, Security Management, Cyber Threat Hunting, Event Monitoring, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Network Security, Data Security, Authentications, User Provisioning, Encryption, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Advanced Encryption Standard (AES), Single Sign-On (SSO), Threat Modeling, Cyber Attacks, Cyber Risk, Cybersecurity, Computer Security, Data Management, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Business Software, Computer Hardware, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Enterprise Security, System Software, Information Technology, Hardware Troubleshooting, Computer Architecture, Technology Solutions, System Configuration, Technical Support and Services, Servers, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Threat Hunting, Cyber Security Assessment, Virtual Machines, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Starweaver
Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Technical Communication, Incident Response, Writing, Technical Documentation, Data Analysis Software, File Systems, Artifactory, Microsoft Windows
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Digital Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption
Intermediate · Course · 1 - 3 Months

CertNexus
Skills you'll gain: Threat Modeling, Cybersecurity, Cyber Threat Intelligence, Threat Management, Information Systems Security, Threat Detection, Security Management, Cyber Risk, Security Strategy, Cyber Security Strategy, Risk Analysis, Computer Security, Risk Mitigation, Risk Management, Network Security, Risk Management Framework, Enterprise Risk Management (ERM), Risk Appetite, Trend Analysis, Technical Documentation
Mixed · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: File Systems, Digital Forensics, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, Data Storage
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Cyber Threat Intelligence, Investigation, Threat Detection, Digital Forensics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks