
University of Colorado Boulder
Skills you'll gain: Crisis Management, Climate Change Adaptation, Change Management, Organizational Change, Engineering Management, Leadership Studies, Sustainable Development, Sustainable Systems, Organizational Development, Systems Thinking, Organizational Leadership, Risk Management, Leadership, Cultural Responsiveness, Cross-Functional Collaboration, Vulnerability, Environmental Issue
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Containerization, IT Security Architecture, Cloud Platforms, Cloud Deployment, Cloud Computing Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines
Intermediate · Course · 1 - 3 Months

Banco Interamericano de Desarrollo
Skills you'll gain: Risk Analysis, Risk Management, Risk Modeling, Hazard Analysis, Project Risk Management, Failure Analysis, Risk Mitigation, Failure Mode And Effects Analysis, Climate Change Adaptation, Vulnerability Assessments, Case Studies, Quantitative Research, Qualitative Research
Advanced · Course · 1 - 4 Weeks
Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Security Testing, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Security Awareness, Dependency Analysis, Amazon Elastic Compute Cloud, Compliance Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Vulnerability Assessments, Cryptography, Cryptographic Protocols, Security Controls, Vulnerability Management, Security Engineering, Threat Management, Data Security, Cyber Threat Intelligence, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Scripting, Network Protocols, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Infrastructure Security, Vulnerability Management, Vulnerability Assessments, Incident Response, Cyber Threat Intelligence, Security Strategy, Cybersecurity, Security Management, Cyber Security Assessment, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Security Strategy, Cyber Attacks, Incident Management, Cyber Threat Hunting, Network Security, Cyber Security Policies, Intrusion Detection and Prevention, Threat Detection, Internet Of Things
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cloud Computing, Cyber Security Policies, Cloud Management, Security Controls, Security Management, Vulnerability Assessments
Beginner · Project · Less Than 2 Hours

Skills you'll gain: AI Integrations, Webhook Security, Security Architecture Review, Performance Stress Testing, Performance Testing, IT Security Architecture, Security Requirements Analysis, Application Security, Cloud Standards, Vulnerability Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Azure DevOps, Devops Tools, Application Security, Software Documentation, Authentications, Vulnerability Scanning
Intermediate · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Endpoint Detection and Response, Threat Management, AI Security, Incident Response, Vulnerability Management, Vulnerability Assessments, Google Gemini, Gemini, Generative AI
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Exploit development, Security Testing, Cyber Security Assessment, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Exploitation techniques, Cyber Security Policies, Data Security, Amazon S3, Scenario Testing, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks