
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Universidades Anáhuac
Skills you'll gain: Malware Protection, Information Systems Security, Cybersecurity, Cyber Attacks, Data Security, Security Awareness, Network Security, Information Assurance, Threat Modeling, Security Controls, Human Factors (Security), Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Data Sharing, Authentications
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Continuous Monitoring, Risk Management, FinTech, Change Management, Emerging Technologies
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cybersecurity, Malware Protection, Cyber Attacks, Network Security, Information Systems Security, Intrusion Detection and Prevention, Security Testing, Penetration Testing, Firewall, Threat Detection, Internet Of Things, Exploitation techniques, Network Analysis
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months