
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Electronic Hardware, Software Systems, Hardware Architecture, System Software, System Programming, Real Time Data, Operating Systems, Service Level, Linux, OS Process Management, System Design and Implementation, Service Design, Algorithms
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: API Design, Restful API, Middleware, Application Deployment, Software Testing, Postman API Platform, Microsoft Azure, Cloud Development, Software Documentation, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, Infrastructure Security, General Networking, Cybersecurity, Cloud Platforms, Cryptography, Network Protocols, Automation, Emerging Technologies, Embedded Systems, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Threat Modeling, Network Security, Internet Of Things, Identity and Access Management, Encryption, Security Engineering, Infrastructure Security, Cybersecurity, Security Controls, Threat Management, Cloud Security, Vulnerability Assessments, Threat Detection, Cloud Solutions, Systems Architecture, Cryptography, Information Privacy, Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Mixed · Course · 1 - 4 Weeks

EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Threat Modeling, Systems Architecture, Debugging, Computer Architecture, Hardware Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, Linux, Microsoft Windows
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: User Research, Persona (User Experience), User Experience, Verification And Validation, Usability Testing, User Centered Design, Human Computer Interaction, User Interface (UI) Design, Embedded Systems, Wireframing, Prototyping
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Test Planning, Embedded Software, Embedded Systems, Functional Requirement, Systems Design, System Requirements, System Design and Implementation, Software Design, Prototyping, Technical Design, Conceptual Design, Python Programming
Mixed · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months