
Skills you'll gain: Ansible, Infrastructure as Code (IaC), DevOps, Kubernetes, YAML, Docker (Software), Automation, Debugging, Security Controls, Microsoft Windows, Configuration Management
Intermediate · Course · 3 - 6 Months

Fractal Analytics
Skills you'll gain: Model Context Protocol, AI Security, Threat Modeling, AI Workflows, Secure Coding, LLM Application, Enterprise Architecture, Generative AI Agents, Security Controls, Interoperability, Agentic systems, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Network Security, Security Awareness, Remote Access Systems, Mobile Security, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Prompt Engineering, Cloud Deployment, Software Development Life Cycle, Cloud-Native Computing, Istio, Software Architecture, Kubernetes, CI/CD, Cloud Computing Architecture, React Redux, Node.JS, Responsive Web Design, Restful API, Django (Web Framework), Git (Version Control System), HTML and CSS, Server Side, Cloud Computing, Data Import/Export, Engineering Software
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Data Analysis Software, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, IT General Controls (ITGC), Cloud Security, Cloud Computing, Cyber Security Assessment, Cybersecurity, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Risk Management Framework, Data Security, Identity and Access Management, Incident Response, Technical Communication
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Open Web Application Security Project (OWASP), Responsible AI, Threat Modeling, Vulnerability Scanning, AI Personalization, Continuous Integration, Code Review, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Mobile Security, Model Deployment, Mobile Development, Continuous Monitoring, Application Security, Threat Modeling, Apple iOS, Security Requirements Analysis, System Monitoring, Encryption, Threat Management, Security Management, Information Privacy, Program Implementation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Generative AI, Cloud Security, Cloud Infrastructure, Cybersecurity, Cloud Platforms, Cloud Computing, Data Storage, Peripheral Devices, Computer Hardware, Cyber Attacks, System Configuration, Artificial Intelligence, Cloud Storage, OSI Models, General Networking, Data Security, Test Planning
Beginner · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months