Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Assurance, Security Controls, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Risk Management Framework, Technical Communication, Vulnerability Assessments, Data Integrity, Automation
Intermediate · Course · 1 - 3 Months

Universitat Politècnica de València
Skills you'll gain: Encryption, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security Awareness Training, Cybersecurity, Cyber Attacks, Identity and Access Management, Security Awareness, Data Security, Personally Identifiable Information, User Accounts, Information Systems Security, Human Factors (Security), Email Security, Cyber Risk, Information Privacy
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Azure Active Directory, Active Directory, Regulatory Compliance, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Scenario Testing, Threat Detection, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Power BI, Microsoft Excel, Data Analysis, Data Visualization, Data Storage, Microsoft Power Platform, Data Collection, Data Quality, Business Intelligence, Timelines, Advanced Analytics, Database Design, Statistical Reporting, Statistical Visualization, Data Integration, Data Storage Technologies, SQL, Data Manipulation, Microsoft SQL Servers, Data Security
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Operating Systems, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Threat Modeling, System Programming, Computer Programming, Software Engineering, C (Programming Language), Real Time Data
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Red Hat Enterprise Linux, Command-Line Interface, Linux Administration, Linux Commands, User Accounts, Linux, Operating System Administration, Software Installation, System Configuration, Systems Administration, Security Controls, File Management, System Monitoring, User Interface (UI)
Mixed · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Computer Security Incident Management, Security Management, Ubuntu, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Remote Access Systems, Scripting, MySQL
Beginner · Professional Certificate · 3 - 6 Months

Google Cloud
Skills you'll gain: User Accounts, Mobile Security, Cloud Computing, Security Controls, Identity and Access Management, Cloud Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Role-Based Access Control (RBAC), System Configuration, Multi-Factor Authentication, Data Loss Prevention
Beginner · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months