
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Containerization, Docker (Software), Microservices, Authentications, OAuth, Integration Testing, Event-Driven Programming, Secure Coding, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration, Authorization (Computing), Transaction Processing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Solutions, Cloud Infrastructure, Cloud Computing, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Cloud Security, Cloud Computing, Security Controls, Security Engineering, Vulnerability Assessments, System Configuration
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Health Information Management, Regulatory Compliance, Data Management, Healthcare Industry Knowledge, Health Care, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Security, Telehealth, Security Management, Information Privacy, Electronic Medical Record, Threat Management, Emerging Technologies, Information Technology
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Gemini, Google Cloud Platform, Application Deployment, Generative AI, Cloud Security, Security Controls, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months