
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Governance, Network Protocols, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Virtual Private Networks (VPN), Amazon S3, Data Security, Multi-Cloud, AWS Identity and Access Management (IAM), Google Cloud Platform, Data Encryption Standard, Azure Active Directory, Threat Management
Beginner · Course · 3 - 6 Months

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Google Cloud Platform, Network Security, Cloud Infrastructure, Data Security, Cloud Computing Architecture, IT Automation, General Networking, Cloud Technologies, Computer Networking, Infrastructure Security, Cybersecurity, Security Controls, Infrastructure as Code (IaC), Digital Transformation
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Medical Privacy, Personally Identifiable Information, Information Privacy, Security Awareness, Data Security, Cybersecurity, Security Controls, Health Information Management, Data Sharing, Authorization (Computing), Health Care Procedure and Regulation, Data Access, Disaster Recovery
Beginner · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Amazon Web Services, Infrastructure Security, Security Information and Event Management (SIEM), Cloud Security, Security Software, Security Controls
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months