
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Communication Systems, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, General Networking, Computer Networking, Network Infrastructure, Network Performance Management, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms
Intermediate · Specialization · 3 - 6 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Mobile Security, Cybersecurity, Penetration Testing, Cloud Security, Malware Protection, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Security Testing, Cyber Security Assessment, Information Systems Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, Interviewing Skills, Cyber Security Strategy, Cyber Risk, Cyber Operations, Cyber Security Policies, Organizational Structure, Cyber Governance, Workforce Development, Security Strategy, Security Management, Professional Networking, Succession Planning, Training and Development
Beginner · Course · 1 - 3 Months

Skills you'll gain: Virtual Private Networks (VPN), Network Security
Intermediate · Course · 3 - 6 Months

Microsoft
Skills you'll gain: Network Security, Network Protocols, TCP/IP, Cloud Computing, Firewall, Cloud Services, General Networking, Networking Hardware, Network Architecture, OSI Models, Microsoft Azure, Computer Networking, Network Infrastructure, Network Monitoring, Virtualization
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Scanning, Vulnerability Assessments, Application Security, Authentications, Wireless Networks, Network Security, Linux, Encryption
Mixed · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Cyber Security Policies, Cryptography, Threat Modeling, Network Protocols, Data Security, OSI Models, Security Controls, Encryption, Public Key Infrastructure, TCP/IP, Data Storage Technologies, Zero Trust Network Access, Data Management, Governance Risk Management and Compliance
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months