
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Application Security, Cybersecurity, Email Security, Identity and Access Management, Firewall
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: DevSecOps, Cryptography, Network Security, Secure Coding, Application Security, Encryption, IT Security Architecture, Security Testing, Data Ethics, Advanced Encryption Standard (AES), Cyber Threat Intelligence, Cybersecurity, Cyber Security Assessment, CI/CD, Cloud Security, Software Development, Security Controls, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, Network Security, AWS Identity and Access Management (IAM), Data Security, Authentications, Encryption, Advanced Encryption Standard (AES), Cyber Risk, Cybersecurity, Data Sharing, Cyber Attacks, Key Management, Computer Security, Data Management, Azure Active Directory, Security Engineering, Cyber Security Strategy, Security Management, Security Awareness
Intermediate · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Brute-force attacks, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Cybersecurity, Data Security, Application Security, Information Technology Architecture
Intermediate · Course · 1 - 3 Months