
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Network Security, Threat Detection, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Google Cloud Platform, Identity and Access Management, Cloud Infrastructure
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Cloud Security, Security Management, Incident Response, Amazon CloudWatch, Amazon Elastic Compute Cloud, Amazon S3, Multi-Factor Authentication, Configuration Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security
Advanced · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Management, Network Analysis, AI Security, Network Security, Network Monitoring, NIST 800-53, Network Protocols, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Cloud Security, Network Troubleshooting, Identity and Access Management
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks