
University of London
Skills you'll gain: Digital Forensics, Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, ISO/IEC 27001, Network Security, Malware Protection, Incident Management, Statistical Analysis, Cyber Security Strategy
Earn a degree
Degree · 1 - 4 Years

Google Cloud
Skills you'll gain: Threat Detection, Vulnerability Management, Threat Management, Cloud Security, Vulnerability Assessments, Security Management, Multi-Cloud, Risk Management Framework, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Detection, Risk Management Framework, Application Security, Google Cloud Platform, Change Requests
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Power BI, Azure Synapse Analytics, Microsoft Azure, Governance, Real Time Data, Enterprise Architecture, Application Deployment, Data Architecture, DevOps, Database Architecture and Administration, Data Integration, Data Security, Microsoft 365, Role-Based Access Control (RBAC), Scalability, Collaborative Software, Version Control
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Security, IT Security Architecture, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Solutions, Cloud Computing Architecture, Cybersecurity, Cloud Computing, Threat Detection, Security Strategy, Cloud Platforms, Enterprise Architecture, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Intermediate · Project · Less Than 2 Hours

Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Data Integrity, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, UI Components, Email Security, Active Directory
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Threat Management, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms, Software As A Service
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Data Security, Key Management, Cloud Applications, Role-Based Access Control (RBAC), Cloud Storage, Data Encryption Standard, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months