
Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
Intermediate · Course · 1 - 4 Weeks

Multiple educators
Skills you'll gain: Incident Response, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Penetration Testing, Cloud Services, Business Continuity, Disaster Recovery, Security Controls, Generative AI, Configuration Management, Governance, Cloud Security, Cloud Infrastructure, Cybersecurity, Data Storage, Peripheral Devices, Application Security, Information Technology, Cryptography
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Threat Modeling, Personally Identifiable Information, Security Awareness, Threat Management, Network Security, Information Privacy, Malware Protection, Mitigation
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, Prompt Engineering, Anomaly Detection, Vulnerability Management, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Encryption, Personally Identifiable Information, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation, Research
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Infrastructure Security, Information Privacy, Cyber Governance, Cryptography, Network Security, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months