
Google Cloud
Skills you'll gain: Vulnerability Management, Threat Detection, Cloud Security, Vulnerability Assessments, Multi-Cloud, Cyber Security Assessment, Security Management, Incident Management, Risk Management Framework, Security Information and Event Management (SIEM), Enterprise Security, Google Cloud Platform
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection, Cryptography, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Virtual Networking, Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud, Load Balancing
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Threat Detection, Vulnerability Management, Threat Management, Cloud Security, Vulnerability Assessments, Security Management, Multi-Cloud, Risk Management Framework, Incident Management
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Network Protocols, Data Ethics, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Linux, Security Controls, Authentications, Network Security, Linux Commands, System Configuration, Servers, Server Administration, Encryption, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months