
Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Computing Architecture, Data Loss Prevention, Application Security, Cloud Services, Encryption, Security Management, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

Campus BBVA
Skills you'll gain: Computer Security Incident Management, Cybersecurity, Cyber Attacks, Incident Management, Security Information and Event Management (SIEM), Fraud detection, Network Security, Security Awareness, Threat Detection, Email Security, Payment Systems, Identity and Access Management, Mobile Security, Authentications
Intermediate · Course · 1 - 3 Months

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management
Mixed · Course · 1 - 3 Months