Learn network security principles for protecting digital networks. Understand threats, vulnerabilities, and security measures.

EIT Digital
Skills you'll gain: General Data Protection Regulation (GDPR), Information Privacy, Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Integrity, Vulnerability Assessments, Law, Regulation, and Compliance, Big Data, Cryptography
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Information and Event Management (SIEM), Security Management, Computer Security Incident Management, Incident Response, Amazon CloudWatch, Application Security, Amazon Elastic Compute Cloud, Amazon S3, Data Access, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Secure Coding, Cloud API, Cloud Development, Database Development, Application Deployment, Database Management, Server Side, Web Applications, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Cloud Management, Multi-Cloud, Threat Detection, Risk Management Framework, Enterprise Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Systems Integration, Enterprise Application Management, Data Governance, Security Strategy, Cloud Management, Network Troubleshooting, Enterprise Security, Security Management, Security Controls, Threat Modeling, Continuous Monitoring, Cyber Security Strategy
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Apache Kafka, Apache Spark, Data Pipelines, Distributed Computing, Real Time Data, Security Controls, Configuration Management, Data Processing, Performance Tuning, Encryption, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, User Accounts, Virtual Private Networks (VPN)
Intermediate · Course · 1 - 3 Months
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Surveys, Intelligence Collection and Analysis, Survey Creation, Risk Mitigation, Mitigation, Environmental Laws, Sampling (Statistics), Political Sciences, Economic Development, International Relations, Cybersecurity, Immigration Law, Public Safety and National Security, Socioeconomics, Governance, Climate Change Adaptation, Ancient History, Social Sciences, Security Strategy
Earn a degree
Degree · 1 - 4 Years

Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Microsoft Azure, Cloud Security, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Computing Architecture, Cloud Standards, Solution Architecture, Cybersecurity, Cloud Computing, Security Controls, Security Strategy, Enterprise Architecture, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months