
Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Cryptographic Protocols, Computer Security, Security Testing, Security Engineering, Network Security, Data Security, Infrastructure Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Secure Coding, Network Protocols, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Encryption, OSI Models, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, Network Monitoring, Remote Access Systems, TCP/IP, Network Infrastructure, Network Troubleshooting, Network Protocols, Infrastructure Security, Wireless Networks, Virtual Private Networks (VPN), Endpoint Security, Cloud Security, Routing Protocols, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, Cloud Platforms, IT Security Architecture, Cloud Services, Cloud Technologies, Infrastructure Security, Application Security, Data Security, Cybersecurity, Data Management, Computer Science, Risk Management Framework, Information Technology, Encryption, Configuration Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: LinkedIn, Drive Engagement, Content Creation, Professional Networking, Digital Publishing, Social Media, Relationship Building, Branding, Professional Development
Intermediate · Guided Project · Less Than 2 Hours

Cisco Learning and Certifications
Skills you'll gain: Threat Modeling, Threat Detection, Cyber Operations, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Event Monitoring, Network Monitoring, Automation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: PyTorch (Machine Learning Library), Generative Model Architectures, Deep Learning, Image Analysis, Python Programming
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Anomaly Detection, Deep Learning, Telecommunications, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Network Planning And Design, Network Performance Management, Real Time Data, Emerging Technologies, Artificial Intelligence, Generative AI Agents, Generative AI, Wireless Networks, Network Architecture, Computer Networking, Responsible AI, Digital Communications, Network Protocols, System Design and Implementation, Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: LinkedIn, Professional Networking, Social Media, Social Media Content, Professional Development
Beginner · Guided Project · Less Than 2 Hours

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months