
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Threat Detection, General Networking, Vulnerability Management, Linux, Linux Administration, Virtual Machines, Network Analysis
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Security Awareness, Threat Modeling, Risk Analysis, Problem Solving, Communication
Build toward a degree
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months