
Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Cybersecurity, Computer Systems, Linux Commands, Computer Networking, Threat Modeling, Vulnerability Assessments, Virtual Private Networks (VPN), Network Protocols, Computer Architecture, Operating Systems, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months

Knowledge Accelerators
Skills you'll gain: AI Security, Identity and Access Management, Mobile Security, Authentications, Multi-Factor Authentication, Cloud Security, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, General Networking, Linux, Windows PowerShell, Virtual Machines, Computer Security Awareness Training, Web Servers
Beginner · Course · 1 - 4 Weeks

Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Beginner · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Application Security, Encryption, Key Management, Cybersecurity, Cryptography, Network Security, Information Systems Security, Authentications, Secure Coding, Advanced Encryption Standard (AES), Data Encryption Standard, Infrastructure Security, Public Key Infrastructure, Cloud Security, Wireless Networks, Internet Of Things, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Applications, Cloud Computing Architecture, Cloud Platforms, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Authorization (Computing), Data Encryption Standard, Key Management, Infrastructure Security, Security Controls, Firewall
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cyber Threat Intelligence, Cybersecurity, Data Loss Prevention, Threat Detection, Information Privacy, Event Monitoring, Incident Response, Automation
Beginner · Course · 1 - 4 Weeks

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, digital literacy, Information Systems Security, Security Strategy, Security Controls, Data Loss Prevention, Incident Response, Data Storage, Vulnerability Assessments, Patch Management
Mixed · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks