
LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Cybersecurity, Computer Security Incident Management, Cyber Threat Intelligence, Security Controls, Threat Management, Business Risk Management, Cyber Attacks, Cyber Operations, Threat Detection, Cloud Security, Risk Management, Cyber Governance, Security Strategy, Security Awareness, Vulnerability, Governance Risk Management and Compliance, Vulnerability Scanning, Vulnerability Assessments
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Virtual Private Networks (VPN), Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, User Accounts, Load Balancing, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management Framework, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Security Strategy, Continuous Monitoring, Information Systems Security, Data Security, Computer Security, Enterprise Security, Risk Analysis, Threat Detection, Infrastructure Security, Information Assurance
Beginner · Course · 1 - 4 Weeks

Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Network Security, Network Administration, Security Controls, User Accounts, System Configuration, Network Monitoring, Web Servers
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Cloud Standards, Security Controls, Security Testing, Application Development, Containerization, Software Development, CI/CD, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Authentications, AWS Identity and Access Management (IAM), User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks