
Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Network Monitoring, Cybersecurity, General Networking, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection, Cryptography, Encryption
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Information Privacy, General Data Protection Regulation (GDPR), Personally Identifiable Information, Data Security, Data Governance, Data Ethics, Data Loss Prevention, Security Controls, Regulatory Compliance, Compliance Management, Compliance Training, Data Integrity, Security Strategy, Regulatory Requirements, Employee Training
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric
Mixed · Course · 3 - 6 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, IT Security Architecture, DevSecOps, Threat Management, Zero Trust Network Access, Cloud Solutions, Cloud Computing Architecture, Cybersecurity, Cloud Computing, Threat Detection, Security Strategy, Cloud Platforms, Enterprise Architecture, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
Mixed · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, IT Security Architecture, Virtual Private Networks (VPN), Network Administration, Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Incident Response
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Data Encryption Standard, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months