
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Vulnerability Management, Cyber Risk, Security Management, Cyber Security Assessment, Simulations, Configuration Management, Cloud Security
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Cloud Standards, Security Controls, Security Testing, Application Development, Containerization, Software Development, CI/CD, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Firewall, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months