
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Network Security, Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Version Control, GitHub, User Accounts, Role-Based Access Control (RBAC), Git (Version Control System), .NET Framework, Identity and Access Management, Database Management, Object-Relational Mapping, Authorization (Computing), Microsoft Windows, Database Application, Microsoft Development Tools, Application Design, Application Development, C# (Programming Language), Software Design, Authentications, User Interface (UI)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, System Support, Information Technology Operations, Wireless Networks, Network Security, Desktop Support, Information Systems Security, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management
Beginner · Course · 3 - 6 Months

Packt
Skills you'll gain: Security Testing, Cybersecurity, Network Security, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols, Exploitation techniques, Scripting
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks