
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Security Engineering, Network Security, Threat Detection, Firewall, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring
Intermediate · Course · 1 - 4 Weeks