
University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Security Engineering, Network Security, Cryptography, Vulnerability Assessments, Encryption, Transaction Processing, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Scalability
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Network Security, Cyber Attacks, Information Systems Security, Firewall, Malware Protection, Intrusion Detection and Prevention, Brute-force attacks, Internet Of Things, Threat Detection, Exploitation techniques, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, AWS Identity and Access Management (IAM), Identity and Access Management, Incident Response, Computer Security Incident Management, Cloud Computing, Network Security, Data Security, Cloud Platforms, Cloud Computing Architecture, Application Security, Cloud Services, Encryption, Firewall, Virtual Networking, Security Controls, Continuous Monitoring
Build toward a degree
Beginner · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Cyber Attacks, Continuous Monitoring, Enterprise Security, Security Awareness, Cyber Operations, Information Technology Operations, Automation, Systems Integration
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, AI Security, Cloud Deployment, Google Cloud Platform, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Security Engineering
Beginner · Course · 1 - 4 Weeks
Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, AI Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Microsoft Azure, Cyber Security Assessment, Incident Response, Generative AI, Query Languages
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks