
Google Cloud
Skills you'll gain: Cloud Deployment, Google Gemini, Google Cloud Platform, AI Security, Generative AI, Cloud Security, System Configuration, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Hardening, Cloud Security, Network Security, Containerization, Security Controls, CI/CD, Docker (Software), Identity and Access Management, Threat Detection
Advanced · Course · 3 - 6 Months

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, System Monitoring, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Mobile Security, Information Systems Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Software Testing, DevSecOps, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Database Application, Software Architecture, Agile Methodology
Advanced · Course · 1 - 4 Weeks
Skills you'll gain: SonarQube, Code Coverage, Vulnerability, CI/CD, Secure Coding, GitLab, Jenkins, Application Security, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Maintainability, Software Technical Review, Kubernetes, GitHub, Software Installation, Security Management, Data Integration, Quality Improvement, Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, Network Architecture, TCP/IP, Threat Management, Cybersecurity, Network Security, Threat Detection, Network Routers, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, DevSecOps, Cyber Security Strategy, Penetration Testing, Business Risk Management, Compliance Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months