
Skills you'll gain: Exploratory Data Analysis
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection
Beginner · Course · 1 - 3 Months

Pearson
Skills you'll gain: Linux Administration, Linux, Operating System Administration, TCP/IP, Authorization (Computing), System Configuration, Hardening, Network Routing, Network Troubleshooting, Network Administration, Network Analysis, Network Protocols, File Systems, User Accounts, Service Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Network Troubleshooting, Cloud Computing, Cloud Management, Security Controls, Cloud Security, Hardware Troubleshooting, Capacity Management, Scenario Testing, Application Security, Automation, Performance Tuning, Performance Testing, Data Security, Network Security, Application Deployment, Configuration Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Augmented and Virtual Reality (AR/VR), Virtualization, Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Skills you'll gain: General Networking, Network Architecture, TCP/IP, Cybersecurity, Networking Hardware, Computer Networking, Network Security, Threat Detection, Network Routers, Cyber Attacks, Network Switches, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Vulnerability Scanning, Authorization (Computing), Information Privacy, Incident Management
Intermediate · Course · 1 - 4 Weeks