
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Cybersecurity, Email Security, Firewall, Algorithms
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Multi-Factor Authentication, Authentications, Identity and Access Management, Security Controls, Security Awareness, Risk Management Framework, Data Security, Safety and Security, Security Management, Human Factors (Security), Cyber Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Cloud Development, Microsoft Azure, Cloud Storage, Data Storage, Serverless Computing, Software Development, Cloud Security, Virtual Machines, Data Storage Technologies, Continuous Deployment, Development Environment, Cloud Management, Application Deployment, Cloud Applications, Virtualization and Virtual Machines, Data Security, Microsoft Power Automate/Flow, Event-Driven Programming, C# (Programming Language)
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Workflow Management, Collaboration, Team Building, Project Coordination, Teamwork, Project Management, Project Management Software, User Feedback, Security Controls, Strategic Communication, Automation, Team Management, Role-Based Access Control (RBAC), Business Process Automation, Constructive Feedback, Collaborative Software, Communication, Authorization (Computing), Productivity Software, Data Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Authentications, Role-Based Access Control (RBAC), Splunk, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Identity and Access Management, Lightweight Directory Access Protocols, Authorization (Computing), Security Controls, Data Access, User Accounts, Scripting, Proxy Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: System Configuration, Linux, Information Systems Security, Network Routers, Performance Tuning, Mac OS, Information Technology, Email Security, System Support, Android (Operating System), Data Maintenance, Network Security, File Systems, Multi-Factor Authentication, Scripting, Virtualization and Virtual Machines, Apple iOS, Hardware Troubleshooting, Artificial Intelligence, Authentications
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Security Controls, Data Security, System Configuration, Security Awareness, Project Management Software, Multi-Factor Authentication, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Authentications, AWS Identity and Access Management (IAM), User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks