
Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Wireless Networks, Network Performance Management, Network Monitoring, Dynamic Host Configuration Protocol (DHCP), Ansible, Network Administration, Firewall, Software-Defined Networking, Network Planning And Design, Network Infrastructure, Network Protocols, Infrastructure as Code (IaC), Terraform, Configuration Management, Encryption
Advanced · Course · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Deployment, Cloud Computing Architecture, Cloud Computing, Cloud Services, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Security Controls, Secure Coding, Public Cloud, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Data Integrity, Risk Mitigation, Risk Analysis, Cross-Functional Collaboration, Encryption, Accountability
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: NSX-T Network Virtualization, Virtual Networking, Virtualization, Network Architecture, Disaster Recovery, Software-Defined Networking, Network Security, Business Continuity Planning, IT Automation, Firewall, Network Routing, Business Transformation, Application Security, Hybrid Cloud Computing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: AI Security, Google Gemini, Google Cloud Platform, Cloud Security, Cloud Deployment, Security Controls, Vulnerability Assessments, Threat Detection, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Cyber Security Strategy, Distributed Denial-Of-Service (DDoS) Attacks, System Monitoring, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Beginner · Specialization · 1 - 3 Months