
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Multi-Factor Authentication, Data Integration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Apache, Web Servers, Authentications, Application Servers, Server Side, Secure Coding, Web Applications, Application Security, Restful API, Servers, Back-End Web Development, Javascript
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Single Sign-On (SSO), User Provisioning, User Accounts, Security Assertion Markup Language (SAML), Authorization (Computing), Authentications, Role-Based Access Control (RBAC), OAuth, Public Key Infrastructure, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Hardening, Key Management, Data Security, Cloud Security, Security Management, Security Controls, Encryption, Authorization (Computing), Identity and Access Management, Data Management, System Configuration, Servers, Configuration Management, Database Management
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Spring Framework, Web Applications, Java Platform Enterprise Edition (J2EE), Java, Object Oriented Design, Back-End Web Development, Authentications, Application Development, Software Design, Database Design, Model View Controller, Databases
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Lightweight Directory Access Protocols, Splunk, System Monitoring, Role-Based Access Control (RBAC), Authentications, Data Storage, Data Management, Data Infrastructure, Authorization (Computing), Enterprise Security, Disaster Recovery, Identity and Access Management, Data Integrity, User Accounts, Dataflow, Data Security, System Configuration, Configuration Management
Mixed · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months