
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Firewall, Network Monitoring, Google Cloud Platform, Network Troubleshooting, Intrusion Detection and Prevention, Identity and Access Management, Threat Detection, Proxy Servers
Intermediate · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, Network Monitoring, Virtualization
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Identity and Access Management, Kubernetes, OAuth, Encryption, Cloud API, Application Security, Authorization (Computing), Data Encryption Standard, Cloud Storage, Authentications, Data Security, Application Programming Interface (API), Virtual Machines, Vulnerability Scanning, Key Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Troubleshooting, Proxy Servers, Network Monitoring, Cloud Security, Intrusion Detection and Prevention, Firewall, Google Cloud Platform, Threat Detection, Network Analysis, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Threat Management, Vulnerability Management, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Detection, Risk Management Framework, Application Security, Google Cloud Platform, Change Requests
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Systems Integration, Enterprise Architecture, Data Governance, Cloud Deployment, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Problem Management, Threat Modeling, Continuous Monitoring
Advanced · Course · 1 - 4 Weeks
O.P. Jindal Global University
Skills you'll gain: Diplomacy, Intelligence Collection and Analysis, Survey Creation, Risk Mitigation, Mitigation, Environmental Laws, Sampling (Statistics), Qualitative Research, Political Sciences, Economic Development, International Relations, Cybersecurity, Immigration Law, Public Safety and National Security, Socioeconomics, Governance, Ancient History, Climate Change Adaptation, Social Sciences, Security Strategy
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Data Management, Microsoft Azure, Real Time Data, Metadata Management, Data Architecture, Event-Driven Programming, Personally Identifiable Information, Operational Databases, Identity and Access Management, Power BI, Data Modeling, Security Controls, Role-Based Access Control (RBAC), Database Architecture and Administration, Analytics, Azure Active Directory, System Monitoring, Enterprise Architecture, Taxonomy, Hybrid Cloud Computing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Threat Management, Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Data Integrity, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, UI Components, Email Security, Active Directory
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Apache Kafka, Apache Spark, Data Pipelines, Distributed Computing, Real Time Data, Data Integration, Apache Hadoop, Security Controls, Configuration Management, Data Processing, Performance Tuning, Encryption, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Data Security, Key Management, Cloud Applications, Role-Based Access Control (RBAC), Cloud Storage, Data Encryption Standard, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months