
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Deployment, Network Administration, Cloud Infrastructure, Firewall, Network Infrastructure, Data Security, Docker (Software), Security Management, AI Security, Virtual Private Networks (VPN), Software As A Service, Hybrid Cloud Computing, Threat Modeling, Containerization, Threat Detection, Threat Management, Enterprise Security
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 3 - 6 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Leeds
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Graph Theory, Data Structures, Operations Research, Public Key Cryptography Standards (PKCS), Cryptography, Programming Principles, Computational Thinking, Pseudocode, Design Strategies, Data Encryption Standard, Computer Science, Tree Maps, Encryption, Linear Algebra, Combinatorics, Mathematical Modeling, Advanced Mathematics, Python Programming
Build toward a degree
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Containerization, Cloud Computing Architecture, Virtual Networking, Network Architecture, Role-Based Access Control (RBAC), Network Security, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Data Loss Prevention, Cloud Security, Data Security, Security Controls, Google Cloud Platform, Cloud Engineering, Security Engineering, Information Technology Operations, Network Security, Firewall, CI/CD, Encryption, Virtual Networking
Beginner · Course · 1 - 3 Months

University of California San Diego
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Arithmetic, Algorithms, Theoretical Computer Science, Computational Thinking, Algebra, Python Programming
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks