
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Communication Planning, Communication Strategies, Communication, Stakeholder Communications, Project Management Software, Business Communication, Strategic Communication, Project Documentation, Stakeholder Management, Expectation Management, Key Performance Indicators (KPIs), Performance Metric, Performance Reporting, Standard Operating Procedure, Performance Measurement, Service Level Agreement, Project Management Life Cycle, Process Improvement
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Cyber Security Assessment, Brute-force attacks, Python Programming, Programming Principles, File I/O, Algorithms, Debugging, Scripting, Data Structures, User Interface (UI), Statistical Programming, UI Components, Application Development, File Management
Beginner · Specialization · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Network Protocols, Network Troubleshooting, Network Planning And Design, Network Routing, TCP/IP, Computer Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Network Security, Local Area Networks, Network Switches, File Transfer Protocol (FTP)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: TCP/IP, Network Protocols, Network Infrastructure, Network Security, OSI Models, Network Architecture, Routing Protocols, Wireless Networks, Computer Networking, Network Routing, Network Performance Management, Application Security, Network Model, Software-Defined Networking, Computer Security Awareness Training
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks