
Skills you'll gain: Network Security, Incident Response, Incident Management, Business Continuity Planning, Business Continuity, Disaster Recovery, Security Controls, System Configuration, Configuration Management, Governance, Cyber Operations, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Role-Based Access Control (RBAC)
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Gemini, Google Gemini, Command-Line Interface, Generative AI Agents, LLM Application, Code Review, Model Context Protocol, Computer Programming Tools, Secure Coding, Agentic systems, Application Security
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Internet Of Things, Networking Hardware, Network Infrastructure, Network Routers, Electrical Wiring, General Networking, Embedded Software, Network Switches, Network Protocols, Security Controls, Network Architecture, Cloud Infrastructure, Wireless Networks, Network Routing, Local Area Networks, Telecommunications, Communication Systems, Distributed Computing, Python Programming, Machine Learning
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, File I/O, IT Automation, Scripting Languages, Data Import/Export, Algorithms, Automation, Computer Programming, Maintainability, Data Structures
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Exploitation techniques, Penetration Testing, Cyber Attacks, Data Persistence, Scripting, IT Automation, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management
Mixed · Course · 1 - 4 Weeks