
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Enterprise Security, Network Architecture, Security Controls, Performance Tuning, Cybersecurity, Malware Protection, Configuration Management
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
Mixed · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Cloud Computing Architecture, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks