
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, AWS Identity and Access Management (IAM), Encryption, Personally Identifiable Information, Data Security, Authentications, Threat Detection, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

IBM
Skills you'll gain: Exploratory Data Analysis, Data Storytelling, Data Wrangling, Dashboard, Data Visualization Software, Plotly, Web Scraping, Data Visualization, Data Presentation, Interactive Data Visualization, Generative AI, SQL, Data Analysis, Big Data, IBM Cognos Analytics, Excel Formulas, Professional Networking, Data Import/Export, Microsoft Excel, Python Programming
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Macquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Anomaly Detection, Threat Modeling, Cyber Security Strategy, Security Controls, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Vulnerability Scanning, Security Awareness, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Malware Protection, Email Security, Network Security, Fraud detection, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Threat Intelligence, Cyber Risk, Virtual Private Networks (VPN), Social Media
Beginner · Specialization · 3 - 6 Months