
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Spring Boot, Configuration Management, API Gateway, JUnit, Java Programming, Java, Application Design, Unit Testing, Middleware, Service Oriented Architecture, Software Design Patterns, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon CloudWatch, Data Encryption Standard, AWS CloudFormation, IT Automation, Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Vanderbilt University
Skills you'll gain: Spring Boot, Spring Framework, Restful API, Application Programming Interface (API), API Design, Data Persistence, Web Applications, Application Frameworks, Software Testing, Object-Relational Mapping, Hibernate (Java), Application Security, Authentications, JSON, Authorization (Computing), Dependency Analysis
Beginner · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Amazon S3, Authorization (Computing), Role-Based Access Control (RBAC), Authentications, Single Sign-On (SSO), User Accounts, Data Security, Multi-Factor Authentication, Encryption
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Data Structures, Spring Boot, Restful API, Model View Controller, Spring Framework, Java Programming, Java, Back-End Web Development, Authentications, Authorization (Computing), Algorithms, Object Oriented Programming (OOP)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: AWS Kinesis, Amazon Web Services, Amazon CloudWatch, AWS Identity and Access Management (IAM), Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Amazon S3, Authentications, AWS CloudFormation, Key Management, Microservices, Real Time Data, Encryption
Intermediate · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months