
Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Business Systems, User Requirements Documents, Process Analysis, Business Process Modeling, Dataflow
Beginner · Course · 1 - 3 Months

Skills you'll gain: Backlogs, Requirements Management, User Requirements Documents, Business Requirements, Performance Measurement, Requirements Analysis, Business Analysis, Root Cause Analysis, Project Performance, Data Mining, Jira (Software), Solution Architecture, Process Improvement, Data-Driven Decision-Making, Analysis, Prioritization, Change Management, Stakeholder Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Computing Architecture, Cloud Standards, Solution Architecture, Cybersecurity, Cloud Computing, Security Controls, Security Strategy, Enterprise Architecture, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, General Networking, Network Security, Cybersecurity, Infrastructure Security, Computer Networking, Risk Management Framework, Record Keeping, Data Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Cloud Infrastructure, Infrastructure As A Service (IaaS), Hardening, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks