
Arizona State University
Skills you'll gain: Intellectual Property, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Data Security, Storytelling, Content Creation, Cyber Security Strategy, Digital Publishing, Vulnerability Assessments, Non-Verbal Communication, Health Technology, Interpersonal Communications, Communication, Personal Care, Constructive Feedback, Problem Solving, Collaboration, Computer Literacy, Data Literacy
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Vulnerability Assessments, Cyber Security Assessment, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Governance Risk Management and Compliance, Cyber Attacks, Identity and Access Management, Cybersecurity, Cyber Security Strategy, Information Systems Security, AI Security, Cyber Governance, Security Management, Cloud Security, Security Information and Event Management (SIEM), Cyber Security Assessment, Cyber Risk, Security Software, Zero Trust Network Access, Endpoint Security, Human Factors (Security), Risk Management, Data Governance, Artificial Intelligence and Machine Learning (AI/ML)
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cybersecurity, Brute-force attacks, Python Programming, Key Management, Programming Principles, File I/O, Computational Logic, Program Development, Algorithms, Debugging, Code Reusability, Scripting, Data Mapping, Software Testing, User Interface (UI), UI Components, Data Structures, Application Development
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Security Engineering, Network Security, IT Security Architecture, Threat Detection, Firewall, Digital Forensics, Anomaly Detection, Code Review, Network Routing, Linux Commands, Proxy Servers, Linux, Internet Of Things
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Cloud Security, Cyber Security Assessment, Penetration Testing, Microsoft Azure, Exploitation techniques, Security Controls, Azure Active Directory, Brute-force attacks, Email Security, Cloud Storage, Authentications, User Accounts, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security
Beginner · Specialization · 3 - 6 Months