
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cryptography, Application Security, Security Testing, IT Security Architecture, Cyber Threat Intelligence, Cyber Risk, Encryption, Network Security, AI Integrations, DevOps, Cybersecurity, CI/CD, Security Awareness, Cloud Security, Software Development, Security Controls, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Data Security, Network Architecture, Application Security, Information Technology Architecture
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux, Linux Commands, Linux Administration, Cloud Computing Architecture, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Virtual Machines, Firewall, Virtualization, Knowledge of Apple Software, File Management, User Accounts
Beginner · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, Event Monitoring, Cloud Security, Security Management, DevOps, Data Access, Cyber Security Policies, Server Administration, Data Governance, System Configuration, Token Optimization, Data Storage
Intermediate · Specialization · 1 - 3 Months