
Microsoft
Advanced · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months
CertNexus
Skills you'll gain: Data Ethics, Responsible AI, Accountability, Risk Management, Operational Risk, Risk Analysis, Information Privacy, Risk Mitigation, AI Security, Personally Identifiable Information, Safety and Security, Business Ethics, Ethical Standards And Conduct
Beginner · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, Network Administration, General Networking, TCP/IP, Cybersecurity, Network Infrastructure, Firewall, Virtual Private Networks (VPN), Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Authentications, Network Analysis, Software As A Service
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Data Persistence, Risk Analysis
Advanced · Course · 1 - 3 Months
Skills you'll gain: Data Ethics, Business Ethics, Strategic Thinking, Ethical Standards And Conduct, Regulatory Compliance, Analytical Skills, Responsible AI, Technology Strategies, Compliance Management, Decision Making, Business Analysis, Business Strategy, Artificial Intelligence, Information Privacy
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Threat Modeling, Security Awareness, Cyber Threat Intelligence, Threat Management, Network Security, Information Privacy, Malware Protection, Incident Response, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cybersecurity, Vulnerability Scanning, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, TCP/IP, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Cloud Computing, Information Technology Infrastructure Library, Technical Support and Services, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks