
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Salesforce, Salesforce Development, Workflow Management, Data Access, Role-Based Access Control (RBAC), Data Sharing, Authorization (Computing), Business Process, Application Security, Identity and Access Management, Data Security, Automation, Business Process Automation, User Accounts
Intermediate · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Integrity, Data Integration, Power BI, Data Maintenance, Database Management, Microsoft SQL Servers, Data Validation, Relational Databases, Databases, Application Programming Interface (API), Dashboard, Data Visualization, Business Intelligence, Data Security, Role-Based Access Control (RBAC), Auditing, Real Time Data, Data Encryption Standard
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux, Authentications, Remote Access Systems, Linux Administration, User Accounts, Authorization (Computing), Security Controls, System Configuration, Command-Line Interface, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Network Protocols, Data Ethics, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Firewall, Linux Administration, Authorization (Computing), Linux Servers, Security Controls, Linux, Authentications, Network Security, Linux Commands, System Configuration, Servers, Server Administration, Encryption, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, System Monitoring, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, IT Management, System Monitoring, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Unix, Procedure Development, Incident Response
Intermediate · Course · 1 - 3 Months