
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, CI/CD, Cloud Platforms, Vulnerability Assessments, Vulnerability Management, Penetration Testing, Cybersecurity, Configuration Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Public Key Infrastructure, Network Monitoring, Encryption, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches, Authentications
Intermediate · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Application Security, Cloud Infrastructure, Network Security, Data Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Data Governance, Information Privacy, Governance, Law, Regulation, and Compliance, General Data Protection Regulation (GDPR), Compliance Management, Personally Identifiable Information, Regulation and Legal Compliance, Program Development, Data Sharing, Accountability
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Medical Privacy, Personally Identifiable Information, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Information Privacy, Security Awareness, Data Security, Cybersecurity, Information Assurance, Security Controls, Health Information Management, Data Sharing, Data Access, Identity and Access Management, Regulatory Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Cloud Computing, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Vanderbilt University
Skills you'll gain: AI Security, Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Cybersecurity, Law, Regulation, and Compliance, Fraud detection, Prompt Engineering, Public Affairs
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Security Awareness, Information Privacy, Emerging Technologies
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks