
Skills you'll gain: Data Centers, Network Security, Network Troubleshooting, Virtual Machines, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Cloud Infrastructure, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Advanced · Course · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Anomaly Detection, AI Security, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Network Analysis, Machine Learning, Machine Learning Algorithms, Model Evaluation, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, Linux Servers, OS Process Management, Linux, Authentications, Zero Trust Network Access, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Information Systems Security, IT Security Architecture
Intermediate · Specialization · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cloud Security, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Data Governance, Security Information and Event Management (SIEM), Cloud Computing Architecture, Incident Response, Identity and Access Management, Cloud Infrastructure, AWS Identity and Access Management (IAM), MITRE ATT&CK Framework, Business Continuity Planning, Cyber Threat Hunting, Data Management, Virtual Machines, System Monitoring, Network Monitoring, Zero Trust Network Access, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Cloud Security, Generative AI, Security Controls, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months