
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Cyber Attacks, Cyber Governance, Cyber Security Strategy, Security Management, Infrastructure Security, Data Security, Threat Modeling, Computer Security, Security Awareness, Risk Management, Enterprise Security, Vulnerability, Governance, General Networking, Public Safety and National Security, Threat Detection, Artificial Intelligence
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications, Information Architecture
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Application Security, Security Testing, Security Engineering, Threat Management, Cybersecurity, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, File Management, Python Programming, Mathematical Software, Programming Principles, Scripting, Algorithms, Debugging, Data Structures, User Interface (UI), UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Python Programming, Mathematical Software, Programming Principles, Scripting, Algorithms, Debugging, Data Structures, File Management
Mixed · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Threat Modeling, Security Testing, Security Engineering, Cybersecurity, Data Security, Blockchain, Threat Detection, Cryptography, Network Security, Security Strategy, Exploit development, Vulnerability Assessments, Transaction Processing, Regulation and Legal Compliance
Advanced · Course · 1 - 3 Months

Skills you'll gain: Responsible AI, Large Language Modeling, IT Security Architecture, Data Ethics, Threat Modeling, Vulnerability Assessments, Security Engineering, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Artificial Intelligence, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Cryptographic Protocols, Computer Security, Security Testing, Security Engineering, Network Security, Data Security, Infrastructure Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Secure Coding, Network Protocols, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months