
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Vulnerability Assessments, Cyber Threat Intelligence, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks