
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Computer Security Incident Management, Cyber Security Policies, Cyber Security Assessment, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Encryption, OSI Models, Network Architecture, Computer Networking, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Lakes, File Management, Microsoft Azure, Record Keeping, Information Management, Data Management, Data Storage Technologies
Beginner · Guided Project · Less Than 2 Hours
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Cyber Attacks, Continuous Monitoring, Enterprise Security, Security Awareness, Cyber Operations, Information Technology Operations, Automation, Systems Integration
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Network Security, Cyber Attacks, Information Systems Security, Firewall, Malware Protection, Intrusion Detection and Prevention, Brute-force attacks, Internet Of Things, Threat Detection, Exploitation techniques, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months