
Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, System Monitoring, Network Protocols, Security Controls, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Network Switches, Real Time Data, Authentications, Scripting, JSON, Automation, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Infrastructure, Network Performance Management, Authentications, Identity and Access Management, Encryption, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Wireless Networks
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Cyber Security Policies, Security Controls, Application Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cloud-Native Computing, Unstructured Data, Go (Programming Language), Web Servers, MySQL, Web Scraping, Server Side, Kubernetes, Web Applications, Back-End Web Development, Software Development, Linux, Database Software, Relational Databases
Intermediate · Guided Project · Less Than 2 Hours

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Application Security, Cloud Infrastructure, Network Security, Data Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, Network Administration, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Risk Mitigation, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Security Policies, Governance, Data Governance, Security Controls, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks