
Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Computer Networking, Virtual Machines, Enterprise Architecture
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Windows Servers, Authorization (Computing), Microsoft Windows, Authentications, Operating System Administration, User Accounts, Group Policy, Microsoft Servers, Security Controls, Enterprise Security, Active Directory, Identity and Access Management, Servers, Computer Security, System Configuration, Encryption
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months