
Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Continuous Monitoring, Firewall, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Cyber Security Policies, Security Controls, Application Security
Intermediate · Specialization · 1 - 3 Months

AI CERTs
Skills you'll gain: Regulatory Compliance
Advanced · Course · 1 - 3 Months

Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Security Strategy, Threat Detection, Cyber Governance
Beginner · Course · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Computer Security Incident Management, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Information Systems Security, Network Architecture, Computer Networking, Risk Management, DevSecOps, OAuth, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, AI Security, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Amazon S3, Data Security, Multi-Cloud, Data Storage, AWS Identity and Access Management (IAM), Microsoft Azure, Cloud Storage, Data Encryption Standard
Beginner · Course · 3 - 6 Months

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Security Controls, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks