
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security, Authentications
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: AWS Kinesis, Amazon Web Services, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Open Web Application Security Project (OWASP), CI/CD, Application Deployment, DevOps, Ansible, Docker (Software), Cloud Infrastructure, Infrastructure Security, IT Automation, Application Security, Containerization, Bash (Scripting Language), Continuous Delivery, Firewall, Unit Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Data Integrity, Risk Mitigation, Risk Analysis, Cross-Functional Collaboration, Encryption, Accountability
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Cyber Security Strategy, Distributed Denial-Of-Service (DDoS) Attacks, System Monitoring, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months