The language used throughout the course, in both instruction and assessments.

ISC2
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Information Systems Security, Multi-Factor Authentication, Computer Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Multi-Factor Authentication, Human Factors (Security)
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Cloud Standards, Security Controls, Security Testing, Application Development, Containerization, Software Development, CI/CD, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Amazon Web Services, Disaster Recovery, Amazon Elastic Compute Cloud, Firewall, Network Security, AWS Identity and Access Management (IAM), Cloud Security, Infrastructure As A Service (IaaS), Application Security, Cloud Solutions, Scalability, Security Controls, Network Troubleshooting, Amazon CloudWatch, Network Administration, Virtual Private Networks (VPN), Continuous Deployment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months