
University of Colorado Boulder
Skills you'll gain: Mathematical Modeling, Systems Design, Data Modeling, Software Systems, Simulations, Automation Engineering, Control Systems, Systems Analysis, Safety Assurance, Cyber Engineering, Mechanical Engineering, Differential Equations
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Threat Detection, Security Controls, Threat Management, Intrusion Detection and Prevention, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Endpoint Security, Network Monitoring, Malware Protection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Network Security, Technical Communication
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cloud Security, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy, Wireless Networks, Application Programming Interface (API), Security Controls
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cyber Threat Intelligence, Responsible AI, Cybersecurity, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, AI Product Strategy, Data Ethics, Security Testing, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks