
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Data Security, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Secure Coding, Public Key Infrastructure, Authentications, Identity and Access Management, Web Development, Application Security, Web Applications, Multi-Factor Authentication, Security Strategy
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Security Testing, Network Infrastructure, Network Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Network Protocols, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS CloudFormation, Amazon CloudWatch, Cloud Security, Data Security, Infrastructure as Code (IaC), Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Key Management, Security Controls, Amazon S3, Continuous Monitoring, Firewall, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Security Controls, Application Security, Threat Management, Cloud Management, Data Security, Virtual Machines, Cloud Storage, Data Access, Threat Detection, Vulnerability Scanning, Data Loss Prevention, Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Incident Response, Cryptography, Security Controls, MITRE ATT&CK Framework, Malware Protection, Endpoint Security, Key Management, Authorization (Computing), Vulnerability Assessments, Telecommunications, Encryption, Threat Modeling, Risk Management, Application Security, Public Key Infrastructure, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 3 - 6 Months

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud Platforms, Cloud-Native Computing, Cloud Services, Cloud Computing, Cloud Infrastructure, DevSecOps, Software As A Service, Network Security, Cloud Applications, Public Cloud, Infrastructure Security, Data Security, Firewall, Serverless Computing, Hybrid Cloud Computing, Virtual Machines, Containerization, Data Centers, DevOps
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months