-
Ministry of Electronics and Information Technology (MeitY), Government of India
Generic Online Training in Cyber Security for Central Government Ministries/Departments
Certificate Number: MeitY/ISEA/WCHP/032075
-
Harvard Cybersecurity
Comprehensive cybersecurity training covering essential security practices, risk management, and more.
Certificate ID: 54a0a98e-e85c-4614-ba70-e86973df050e
-
IBM Cybersecurity Fundamentals
Fundamentals of Cybersecurity, covering essential concepts and principles (ID: pzwhlxqm)
-
OpenLearn Gamified Intelligent Cyber Aptitude Skills Training (GICAST)
A gamified approach to developing key cybersecurity skills and aptitude.
-
Oxford Home Study Diploma in Cyber Security
A comprehensive diploma course covering the fundamentals and advanced topics in cybersecurity.
-
Oxford Home Study Certification in Cyber Security
Certification course offering knowledge of basic and intermediate cybersecurity concepts.
-
Oxford Home Study Cyber Security in Artificial Intelligence
Specialized training on the integration of cybersecurity within AI systems.
-
Alison CISA Certification
Certified Information Systems Auditor (CISA) course by Alison.
-
Alison CompTIA Security+
CompTIA Security+ course focused on fundamental cybersecurity principles and practices.
-
Alison CISM Certification
Certified Information Security Manager (CISM) course for security management professionals.
-
Alison Diploma in Cyber Security
A comprehensive diploma covering a wide range of cybersecurity topics and practices.
-
Alison Diploma in Ethical Hacking
A detailed diploma focusing on ethical hacking and penetration testing techniques.
-
Alison Master Linux and Shell Script
Master Linux administration and scripting to enhance your cybersecurity skillset.
-
Cybrary Wireless Hacking
Wireless Hacking course focused on vulnerabilities and mitigation techniques in wireless networks.
-
Cybrary Reconnaissance Techniques
Techniques used in reconnaissance to gather information for penetration testing.
-
Cybrary Network and Perimeter Hacking
Network security and perimeter hacking, identifying and exploiting weaknesses in network defenses.
-
Cybrary Web App Hacking
A course on exploiting vulnerabilities in web applications and securing them.
-
Cybrary Sys Hacking Phases and Attack Techniques
Exploring the phases of system hacking and advanced attack techniques used in penetration testing.
-
Cybrary Mobile Platform, IoT, and OT Hacking
Securing mobile platforms, IoT devices, and Operational Technology from cyber threats.
-
Cybrary CISSP
Certified Information Systems Security Professional (CISSP) certification prep course.
-
Saylor Academy CS105 Introduction to Python
Introduction to Python programming and its application in cybersecurity tasks.
-
Infosys Intro to Cyber Security
A basic course introducing the principles of cybersecurity, risks, and countermeasures.
-
NSDC X Skill India Python with Advanced AI
Combines Python programming skills with AI techniques, aimed at professionals and beginners.
-
EDUCBA Ethical Hacking & Penetration Testing
Comprehensive ethical hacking and penetration testing course divided into multiple modules.
-
Microsoft Security and Threats
- Describe basic cybersecurity threats, attacks, and mitigations
-
Microsoft Entra Identity and Protection
- Describe the identity protection and governance capabilities of Microsoft Entra
- Describe access management capabilities of Microsoft Entra ID
- Describe the authentication capabilities of Microsoft Entra ID
- Describe the function and identity types of Microsoft Entra ID
-
Azure AI Solutions and Cognitive Services
- Develop Generative AI solutions with Azure OpenAI Service
- Build effective copilots with Microsoft Copilot Studio
- Implement knowledge mining with Azure AI Search
- Enhance Microsoft Copilot Studio bots
- Manage topics in Microsoft Copilot Studio
- Plan an Azure AI Document Intelligence solution
- Use prebuilt Form Recognizer models
-
Microsoft Badges
- Microsoft Security, Compliance, and Identity Fundamentals
- Azure AI and Cognitive Services
- Azure Virtual Machines and Cloud Networking
- Azure DevOps and Continuous Integration
- Microsoft Entra Identity Protection
- Azure Networking Solutions
- Microsoft 365 Security
- Azure Sentinel and SIEM Solutions
- Microsoft Power BI Essentials
- Microsoft Azure Fundamentals
- Azure Kubernetes Service (AKS) Basics
- Microsoft Defender for Endpoint
- PowerShell and Cloud Automation
- Microsoft Identity and Access Management
- Cloud Security Architecture
- Azure Security and Governance
- Cloud Security Principles
- Data Protection and Privacy in Cloud Computing
- AI and Machine Learning with Azure
- Microsoft 365 Productivity Solutions
- Microsoft Compliance Manager
- Threat Intelligence in Microsoft Security
- Managing Identity with Microsoft Azure AD
- Microsoft Cloud Adoption Framework
- Azure Resource Manager
- Cloud Security Best Practices
- Azure Security Center
- Cybersecurity Awareness for IT Professionals
- Enterprise Mobility + Security
- Azure Identity and Security Solutions
- Microsoft Teams Security and Compliance
- Azure Synapse Analytics Fundamentals
- Power Automate with Microsoft Flow
- Cybersecurity in Microsoft Cloud
- Power Apps and Cloud Integration
- Securing Azure Resources
- Zero Trust Security in Microsoft Environment
- Azure Advanced Networking
- Data Security with Azure Blob Storage
- Windows Server Security
- Securing Azure Virtual Networks
- Building Secure Web Apps with Azure
- Azure Sentinel Threat Detection
- Monitoring and Alerting with Azure Security
- Identity Governance in Azure
- Incident Response with Microsoft Sentinel
- Cloud Native Security Solutions
- Azure Active Directory Essentials
- Microsoft Threat Protection Solutions
- Data Loss Prevention and Azure Information Protection
- Integrating Azure Security with SIEM Tools
- Building Scalable Cloud Solutions with Azure
- Creating Secure Cloud-Based Applications
- Azure Cost Management and Security
- Data Encryption and Protection in Azure
- Security Operations in Microsoft Defender
- Securing the Hybrid Cloud Environment
- Cloud-Native Security in Microsoft 365
- Microsoft Azure Hybrid Cloud Solutions
- Advanced Identity Protection with Azure
- Application Security in Azure Kubernetes Service (AKS)
- Microsoft Defender Advanced Threat Protection
- Cloud-Native DevSecOps with Azure
- AI in Microsoft Security Solutions
- Threat Hunting in Azure
- Compliance in Microsoft Cloud Solutions