
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Electronic Medical Record, Telehealth, Patient Safety, Health Technology, Health Information Management, Clinical Informatics, Security Awareness, Personally Identifiable Information, Encryption, Help Desk Support, Medical Equipment, Desktop Support, System Support, End User Training and Support, Health Care, Patient Communication, Technical Support, Customer Support
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Internet Of Things, Network Protocols, General Networking, Computer Networking, Wireless Networks, Automation, Real-Time Operating Systems, Emerging Technologies, Manufacturing Operations, Cloud Platforms, Operating Systems, Encryption, Data Security, Software Systems, Market Trend, Market Opportunities, Job Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Cryptography, Disaster Recovery, Business Continuity, Application Security, OSI Models, Encryption, Information Systems Security, Governance Risk Management and Compliance, Secure Coding, Network Security, Infrastructure Security, Authorization (Computing), Security Engineering, Computer Security, Threat Modeling, Security Controls, Software Development, Identity and Access Management
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Theoretical Computer Science, Data Security, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months
Skills you'll gain: OAuth, Salesforce Development, Authentications, Salesforce, Cloud Deployment, Cloud-Based Integration, Systems Integration, Application Programming Interface (API), Application Deployment, Data Integration, API Design, Data Mapping, Restful API, Application Performance Management, System Monitoring, Data Transformation, Secure Coding, Event Monitoring, Security Controls, Real Time Data
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cloud Security, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Data Governance, Security Information and Event Management (SIEM), Cloud Computing Architecture, Incident Response, Identity and Access Management, Cloud Infrastructure, Event Monitoring, AWS Identity and Access Management (IAM), MITRE ATT&CK Framework, Business Continuity Planning, Cyber Threat Hunting, Data Management, Virtual Machines, Network Monitoring, Zero Trust Network Access, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

University of California San Diego
Skills you'll gain: Big Data, Apache Hadoop, Scalability, Data Processing, Data Science, Data Analysis, Unstructured Data, Distributed Computing, Real Time Data, File Systems
Mixed · Course · 1 - 3 Months

BITS Pilani
Skills you'll gain: Relational Databases, User Research, Data Storytelling, Graph Theory, Object Oriented Design, Theoretical Computer Science, Android Development, Database Design, Encryption, Bioinformatics, Feature Engineering, TCP/IP, Operating Systems, Version Control, Database Systems, Computer Systems, Financial Systems, Environment and Resource Management, Game Design, Writing
Earn a degree
Degree · 1 - 4 Years

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Exploit development, Cryptography, Encryption, Exploitation techniques, Technical Design, Emerging Technologies, System Design and Implementation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Beginner · Specialization · 3 - 6 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Application Security, Threat Detection, Information Systems Security, Network Security, Computer Security, Encryption
Beginner · Course · 1 - 4 Weeks