
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Amazon Elastic Compute Cloud, Cloud Computing Architecture, Cloud Computing, Virtual Local Area Network (VLAN), Network Security, Network Architecture, Cloud Infrastructure, Authentications, Virtual Private Networks (VPN), Multi-Factor Authentication, Cloud Security, Network Administration, Load Balancing, Amazon CloudWatch, Containerization, Scalability
Intermediate · Course · 1 - 3 Months

Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Financial Inclusion, Financial Systems, Cryptography, Digital Assets, Financial Regulation, Banking, Encryption, Computer Security, Governance
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Algorithms, Data Structures, Graph Theory, Operations Research, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Computer Programming, Computational Thinking, Cryptography, Programming Principles, Computer Science, Applied Mathematics, Tree Maps, Encryption, Python Programming, Combinatorics, Data Science, Advanced Mathematics, Mathematical Modeling, Design Strategies
Build toward a degree
Advanced · Specialization · 3 - 6 Months
Skills you'll gain: Operating System Administration, Package and Software Management, IT Infrastructure, Network Troubleshooting, Computer Networking, Infrastructure Security, Encryption, Desktop Support, Network Security, Routing Protocols, TCP/IP, Cybersecurity, Lightweight Directory Access Protocols, Technical Support, Active Directory, Network Protocols, Computer Hardware, Cloud Computing, Customer Service, Debugging
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Package and Software Management, Linux Administration, Linux, User Accounts, Command-Line Interface, Operating System Administration, Open Source Technology, Disaster Recovery, Red Hat Enterprise Linux, System Monitoring, Unix Commands, System Configuration, Identity and Access Management, Data Storage Technologies, Systems Administration, Linux Commands, Configuration Management, Patch Management, Security Controls, Software Installation
Mixed · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, Encryption, FinTech, Emerging Technologies, Ledgers (Accounting), Business Modeling, Distributed Computing, Open Source Technology, Digital Assets, Transaction Processing, Scalability
Beginner · Course · 1 - 3 Months

Skills you'll gain: Database Administration, Database Management, Database Architecture and Administration, Relational Databases, Operational Databases, Database Systems, IBM DB2, MySQL, Performance Tuning, PostgreSQL, Disaster Recovery, Data Storage Technologies, Database Design, System Monitoring, Role-Based Access Control (RBAC), User Accounts, Encryption
Intermediate · Course · 1 - 3 Months