
Skills you'll gain: System Monitoring, Network Monitoring, Event Monitoring, System Configuration, Incident Management, Linux Servers, Virtualization, Virtual Machines, TCP/IP, Servers, Security Controls, Apache, Windows Servers, Software Installation, MySQL
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Security Controls, Security Engineering, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Cyber Governance, Industrial Design, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
Beginner · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Vulnerability Assessments, General Networking, Authorization (Computing), Web Applications, Authentications
Mixed · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months