
Board Infinity
Skills you'll gain: Blockchain, User Interface and User Experience (UI/UX) Design, Cryptography, Secure Coding, Application Security, Web Development Tools, React Redux, Encryption, User Experience Design, Key Management, Application Design, Cryptographic Protocols, Application Development, Web Applications, Software Development Tools, Legal Technology, Vulnerability Assessments, Frontend Integration, Data Security, Program Development
Intermediate · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Active Listening, Storytelling, Social Skills, Empathy, Cognitive flexibility, Initiative and Leadership, Creativity, Cultural Diversity, Leadership, Self-Awareness, Social Justice, Communication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, DevSecOps, Infrastructure Security, Vulnerability Scanning, CI/CD, Containerization, Vulnerability Management, Security Controls, Docker (Software), Image Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Software Testing, DevSecOps, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Database Application, Software Architecture, Agile Methodology
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Law, Regulation, and Compliance, Data Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, IT Management, Risk Mitigation, Cybersecurity, Threat Modeling, Operational Risk, Cyber Security Strategy, Vulnerability Assessments, Security Controls, Compliance Management, Information Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Bash (Scripting Language), Microsoft Windows, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Stakeholder Communications, Disaster Recovery, Leadership, Threat Management, Climate Change Adaptation, Resilience, Change Management, Threat Detection, Infrastructure Security, Business Continuity, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Analysis, Sustainable Development
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Blockchain, Secure Coding, Application Security, Legal Technology, Vulnerability Assessments, Program Development, Software Development Tools, Development Testing, Debugging, Application Deployment, Emerging Technologies, Performance Tuning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months