
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Governance, Network Protocols, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Virtual Private Networks (VPN), Amazon S3, Data Security, Multi-Cloud, AWS Identity and Access Management (IAM), Google Cloud Platform, Data Encryption Standard, Azure Active Directory, Threat Management
Beginner · Course · 3 - 6 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Security Information and Event Management (SIEM), Continuous Monitoring, Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Computer Security Incident Management, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Vulnerability Assessments, Cyber Threat Intelligence, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Data Security, Virtual Machines, Remote Access Systems, Role-Based Access Control (RBAC), Data Storage Technologies, Identity and Access Management, Databases, Containerization, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Network Administration, Network Routing, Remote Access Systems, User Accounts, Authorization (Computing)
Advanced · Specialization · 1 - 3 Months