
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Requirements Analysis, Security Requirements Analysis, Requirements Elicitation, Requirements Management, Goal Setting, Meeting Facilitation, Conflict Management, Risk Analysis, Diagram Design, Stakeholder Engagement, Negotiation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Threat Management, Disaster Recovery, Data Governance, Security Controls, Information Privacy, General Data Protection Regulation (GDPR), Identity and Access Management
Beginner · Course · 1 - 4 Weeks

University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Business Analysis, Business Systems, Process Flow Diagrams, User Requirements Documents, Data Flow Diagrams (DFDs), Requirements Management, Diagram Design, Feasibility Studies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Management, Network Analysis, AI Security, Network Security, Network Monitoring, NIST 800-53, Network Protocols, Cloud Security
Intermediate · Course · 1 - 3 Months