
Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Security Controls, Incident Response, Automation, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Systems Development Life Cycle, Security Controls, Software Testing, Security Management, Software Development, Cybersecurity, Data Security, Continuous Monitoring, Risk Management Framework, Authorization (Computing), Identity and Access Management
Beginner · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Application Security, Cloud Infrastructure, Network Security, Data Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Cyber Security Policies, Security Controls, Application Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks