
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Network Security, Brute-force attacks, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, White-Box Testing, Secure Coding, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Public Key Cryptography Standards (PKCS), Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Fraud detection, Verification And Validation
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, AI Security, Exploit development, Network Security, Cyber Security Assessment, Exploitation techniques, Open Web Application Security Project (OWASP), Application Security, Computer Security, Unix, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Web Applications, Server Side, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Computer Networking, Network Protocols, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, People Management, Due Diligence
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Virtual Private Networks (VPN), Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, Performance Tuning, System Configuration, Cybersecurity, Malware Protection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export
Intermediate · Course · 1 - 3 Months