Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation
★ 4.6 (166) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications
★ 4.5 (20) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
★ 4.7 (251) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (600) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Process Modeling, Process Mapping, Business Process Modeling, Process Analysis, Business Analysis, Data Storytelling, Business Analysis Tools, Business Process Improvement, Feasibility Studies, Systems Analysis, Stakeholder Analysis, Process Optimization, Requirements Management, Business Systems Analysis, Systems Design, Communication Planning, Test Planning, Information Technology, Database Management, Agile Methodology
★ 4.7 (4.8K) · Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness
★ 4.7 (4.5K) · Beginner · Specialization · 3 - 6 Months

Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Data Visualization, Data Presentation, AI Security, Interactive Data Visualization, A/B Testing, Threat Management, Open Web Application Security Project (OWASP), Secure Coding, Application Security, Responsible AI, System Monitoring, MLOps (Machine Learning Operations), Analytics, Data Governance, Application Programming Interface (API), Vulnerability Assessments, Cyber Governance, Data Processing, Data Management
Intermediate · Course · 1 - 3 Months

SkillUp
Skills you'll gain: Systems Design, Business Process Modeling, Data Flow Diagrams (DFDs), Systems Analysis, Data Modeling, Process Modeling, Business Systems Analysis, Digital Transformation, Enterprise Modeling, Business Process, Risk Management, Systems Architecture, Business Analysis, Information Technology, Process Flow Diagrams, Prototyping, Computer Science, Agile Methodology, Product Lifecycle Management, Business Communication
★ 4.7 (25) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
★ 4 (10) · Intermediate · Specialization · 3 - 6 Months