
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Enterprise Risk Management (ERM), Business Risk Management, Security Controls, System Implementation, Security Awareness, Information Privacy, Security Management, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Beginner · Course · 1 - 3 Months