
University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Servers, Network Administration, Data Encryption Standard, System Configuration, User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Key Management, Encryption, Windows Servers, Infrastructure Security, Active Directory, Network Infrastructure, Authentications, Cybersecurity, System Configuration, Configuration Management, Data Integrity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Python Programming, Brute-force attacks, Algorithms, Data Integrity
Mixed · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cybersecurity, Security Awareness, Security Controls, Multi-Factor Authentication, Authentications, Financial Market, Market Data, Financial Regulations, Regulatory Compliance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months