
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Software Testing, DevSecOps, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Database Application, Software Architecture, Agile Methodology
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Responsible AI, AI Security, Telehealth, Health Technology, Generative AI, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Healthcare Ethics, Regulatory Compliance, Health Care Procedure and Regulation, Security Strategy, Medical Privacy, Data Security, Analysis, Innovation, Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Kinesis, Amazon Web Services, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: NSX-T Network Virtualization, Virtual Networking, Virtualization, Network Architecture, Disaster Recovery, Software-Defined Networking, Network Security, Business Continuity Planning, IT Automation, Firewall, Network Routing, Business Transformation, Application Security, Hybrid Cloud Computing
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Cloud Deployment, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Event-Driven Programming, Real Time Data
Intermediate · Course · 1 - 4 Weeks