
Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, Cryptography, Security Controls, MITRE ATT&CK Framework, Malware Protection, Endpoint Security, Key Management, Authorization (Computing), Vulnerability Assessments, Telecommunications, Encryption, Threat Modeling, Risk Management, Application Security, Public Key Infrastructure, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 3 - 6 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Business Continuity Planning, Compliance Management, Disaster Recovery, Operational Risk, Financial Services, Financial Regulations, Risk Management, Business Risk Management, Governance, IT Management, Information Assurance, Internal Controls, Risk Analysis, Change Management
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Change Management, Organizational Change, Business Transformation, Process Management, Influencing, Leadership, Adaptability, Innovation, Resource Management, Gap Analysis, Dealing With Ambiguity, Resilience, Creative Thinking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Intrusion Detection and Prevention, Network Analysis, Exploitation techniques, Cryptography, Network Protocols, Computer Networking, General Networking, TCP/IP, Firewall, Encryption
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Virtualization, Operating System Administration, Security Controls, System Configuration, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Enterprise Security, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Monitoring, Azure Active Directory, Vulnerability Management, Apple iOS, Remote Access Systems, Configuration Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

West Virginia University
Skills you'll gain: Recruitment, Sales Training, Sales Management, Talent Recruitment, Sales, Employee Training, Performance Appraisal, Team Motivation, Interviewing Skills, Job Analysis, Performance Measurement
Mixed · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months