
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Security Awareness, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Personally Identifiable Information, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Cyber Security Assessment, Regulatory Requirements
Intermediate · Course · 1 - 3 Months

Workday
Skills you'll gain: Workday (Software), Business Intelligence, Data Integration, Branding
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Modeling, Enterprise Resource Planning, Dashboard, Business Intelligence, Data Visualization Software, Workflow Management, Pivot Tables And Charts, Data Import/Export, Extract, Transform, Load, Data Integration, Microsoft Excel, Data Transformation, Data Security, Scripting
Mixed · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Software Development, Software Configuration Management, Software Development Life Cycle, Software Testing, System Configuration, Threat Modeling, Application Programming Interface (API), Cloud Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Amazon Web Services, Containerization, AWS CloudFormation, Infrastructure as Code (IaC), Amazon CloudWatch, CI/CD, Docker (Software), Kubernetes, Cloud-Native Computing, Cloud Infrastructure, Application Deployment, Serverless Computing, Software Development Life Cycle, Configuration Management, Disaster Recovery, Continuous Deployment, Amazon Elastic Compute Cloud, Cloud Management, DevOps, API Gateway
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Identity and Access Management, Infrastructure Security, Authorization (Computing), Data Storage, Role-Based Access Control (RBAC), Network Security, System Configuration, Continuous Monitoring, Encryption, Key Management, Containerization
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
Beginner · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months