
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Encryption, Network Security, Cybersecurity, Authentications, Public Key Cryptography Standards (PKCS), Vulnerability Assessments, Data Validation, Data Integrity, Transaction Processing, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Howard University
Skills you'll gain: Cloud Computing, Cloud Deployment, Cloud Security, Virtualization, Digital Transformation, Cloud Services, Cloud Infrastructure, Public Cloud, Business Transformation, Private Cloud, Virtual Machines, Data Centers, Business Technologies
Intermediate · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Continuous Monitoring, Cybersecurity, Security Management, Network Security, Security Strategy, Risk Management Framework, Internet Of Things, Cyber Risk, Threat Management, Cyber Security Strategy, Infrastructure Security, Hardware Architecture, Security Engineering, Encryption, Communication Systems, Wireless Networks, Information Systems Security, Vulnerability Assessments, Risk Analysis, Network Infrastructure
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls, Security Awareness, Change Control, Computer Security Awareness Training, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Personally Identifiable Information, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Enterprise Risk Management (ERM), Business Risk Management, Security Information and Event Management (SIEM), Security Strategy
Beginner · Specialization · 1 - 3 Months

Google Cloud
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Load Balancing, Google Cloud Platform, Cloud Storage, Cloud Services, Cloud Computing, Web Servers
Intermediate · Project · Less Than 2 Hours

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Computer Security Incident Management, Cyber Security Policies, Cyber Security Assessment, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months