Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Network Security, Linux, Linux Administration, Linux Servers, Network Administration, Security Controls, Hardening, Ubuntu, Linux Commands, File Management, System Configuration, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Identity and Access Management, Secure Coding, Security Awareness, Threat Modeling, Security Testing, Data Security, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Single Sign-On (SSO), Authentications, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Jenkins, Software Development Life Cycle, CI/CD, Application Security, Secure Coding, Continuous Integration, DevOps, Continuous Delivery, Vulnerability Scanning, Vulnerability Assessments, Software Quality Assurance, Security Awareness, Dependency Analysis, Compliance Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Infrastructure As A Service (IaaS), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Computing, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Azure Active Directory, Microsoft Azure, Active Directory, Web Applications, Cloud Applications, Application Security, Cloud Security, Identity and Access Management, Authorization (Computing), Key Management, Application Programming Interface (API), Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months