
Skills you'll gain: Fraud detection, Sarbanes Oxley Act (SOX) Compliance, Financial Controls, Financial Statement Analysis, Financial Auditing, Internal Controls, Investigation, Corporate Accounting, Compliance Management, Financial Analysis, Anomaly Detection, Risk Control, Business Ethics, Case Studies, Accounting
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Enterprise Security, Network Architecture, Security Controls, Performance Tuning, Cybersecurity, Malware Protection, Configuration Management
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Loss Prevention, AI Security, Responsible AI, Information Privacy, Security Controls, Personally Identifiable Information, Threat Modeling, Data Security, Security Awareness, Incident Response, Cyber Security Policies, Governance, Risk Management Framework, Identity and Access Management, Data Governance, Generative AI
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Information Systems Security, Multi-Factor Authentication, Computer Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Continuous Monitoring, Risk Management, FinTech, Change Management, Emerging Technologies
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, Operating System Administration, User Accounts, Group Policy, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Servers, Computer Security, System Configuration, Encryption
Beginner · Course · 1 - 3 Months
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks