Learn network security principles for protecting digital networks. Understand threats, vulnerabilities, and security measures.

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Security Management, Program Evaluation, Governance, Social Justice, Policy Analysis, Policy Development, Public Policies, Criminal Investigation and Forensics, Social Work, Community Development, Conflict Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Disaster Recovery, System Monitoring, Event Monitoring, Kubernetes, Continuous Monitoring, Application Security, Hardening, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Kubernetes, Cloud Security, Authentications, Prompt Engineering, Infrastructure As A Service (IaaS), Cloud Services, Virtual Machines, Data Loss Prevention, Cloud Storage, Generative AI, Application Development, Network Infrastructure, Encryption, Malware Protection, Cloud Computing, Continuous Monitoring
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Kubernetes, Hardening, Identity and Access Management, Authorization (Computing), User Accounts, Security Controls, Patch Management, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Hardening, Security Controls, Docker (Software), Image Analysis
Intermediate · Course · 1 - 4 Weeks