
University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies
★ 4.3 (693) · Mixed · Course · 1 - 3 Months

Skills you'll gain: Application Security, Network Security, Information Systems Security, Cloud Security, Cybersecurity, System Monitoring, Internet Of Things, Network Monitoring, Cyber Attacks, Mobile Security, Cryptography, Information Privacy, Authorization (Computing), Wireless Networks, Authentications, Data Storage, Patch Management, Operating Systems, Cloud Services, Cloud Platforms
★ 4.7 (17) · Intermediate · Specialization · 1 - 3 Months

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Cyber Attacks, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Application Security, Computer Security Incident Management, Security Management, Cyber Security Strategy, Information Systems Security, Secure Coding, Cyber Security Policies, Cyber Security Assessment, Threat Management, Threat Detection, Information Assurance, Network Security
★ 4.7 (665) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
★ 4.8 (4.1K) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Peripheral Devices, Virtualization, Computer Hardware, System Configuration, Virtualization and Virtual Machines, Operating System Administration, Computer Systems, Virtual Machines, Operating Systems, Hardware Troubleshooting, Linux, Software Installation, Technical Support, Mac OS, Computer Architecture, File Systems, Network Infrastructure, Data Storage, User Accounts, Disaster Recovery
★ 4.7 (2K) · Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Data Loss Prevention, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Computer Architecture, Technology Solutions, Data Storage, Solution Architecture, System Configuration, Technical Support and Services, Cybersecurity
★ 4.8 (1.1K) · Beginner · Course · 1 - 4 Weeks

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Software Systems, System Programming, Cybersecurity, Real Time Data, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Systems Design
★ 4.3 (1.2K) · Intermediate · Specialization · 3 - 6 Months
Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation
★ 4.6 (166) · Beginner · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Information Technology
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management
★ 4.8 (13) · Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (599) · Intermediate · Specialization · 3 - 6 Months