
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, AI Security, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Amazon S3, Data Security, Multi-Cloud, Data Storage, AWS Identity and Access Management (IAM), Microsoft Azure, Cloud Storage, Data Encryption Standard
Beginner · Course · 3 - 6 Months

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Skills you'll gain: Medical Privacy, Personally Identifiable Information, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Information Privacy, Security Awareness, Data Security, Cybersecurity, Information Assurance, Security Controls, Health Information Management, Data Sharing, Data Access, Identity and Access Management, Regulatory Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Mobile Security, Information Systems Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Deployment, Google Gemini, Google Cloud Platform, AI Security, Generative AI, Cloud Security, System Configuration, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Cloud Computing, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Disaster Recovery
Intermediate · Course · 1 - 3 Months