
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Vulnerability Assessments, Security Management, Cyber Risk, Compliance Management, Asset Management, Security Awareness, Cyber Security Strategy, Threat Management, Security Controls
Beginner · Specialization · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Engineering, Security Requirements Analysis, Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Information Privacy, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Governance, ISO/IEC 27001, Enterprise Risk Management (ERM), Cyber Governance, NIST 800-53, Cyber Risk, Compliance Management, Security Controls, Program Implementation, Regulatory Compliance, Cybersecurity, Cyber Security Strategy, Business Continuity, Asset Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Federal Information Security Management Act, Systems Development Life Cycle, Cybersecurity, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Stakeholder Communications, Continuous Monitoring, Cyber Security Policies, Information Assurance
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Malware Protection, Authentications, Identity and Access Management, Cyber Attacks, Threat Detection, Data Integrity
Beginner · Specialization · 3 - 6 Months
Coursera
Skills you'll gain: AI Security, Vulnerability Scanning, Hardening, DevSecOps, Vulnerability Assessments, Responsible AI, Identity and Access Management, MLOps (Machine Learning Operations), Infrastructure Security, Security Controls, Threat Modeling, Model Deployment, Model Evaluation, CI/CD, Continuous Monitoring, AI Personalization, Resilience, Compliance Management, Containerization, Engineering
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Threat Modeling, MITRE ATT&CK Framework, Security Controls, Responsible AI, MLOps (Machine Learning Operations), Secure Coding, Security Testing, Cybersecurity, Model Deployment, Data Security, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Application Lifecycle Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Malware Protection, Penetration Testing, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Security Engineering, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Vulnerability Assessments, Cloud Security, Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Information Systems Security, Secure Coding, Application Security, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Cyber Security Policies, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Medical Office Procedures, Data Management, Medical Records, Personally Identifiable Information, Data Security, Document Management, Security Controls, Information Privacy, Records Management, Taxonomy, Regulatory Compliance, Information Assurance, Encryption, Risk Analysis, Process Mapping
Beginner · Course · 1 - 4 Weeks