
Starweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Financial Regulation, Commercial Banking, Regulatory Requirements
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months

FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cyber Security Strategy, Strategic Decision-Making, Insurance, Compliance Management, Threat Modeling, Business Risk Management, Business Communication, Strategic Prioritization
Intermediate · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management
Intermediate · Course · 3 - 6 Months

University of California, Santa Cruz
Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Control Systems, Network Model, Embedded Systems, Systems Analysis, Technical Design, Computational Logic, Digital Communications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Endpoint Security, IT Security Architecture, Information Technology, Data Security, Network Security, Cloud Security, Information Privacy, Firewall, Cybersecurity, Linux, System Configuration, Security Controls, Cyber Threat Intelligence, Cyber Security Strategy, Microsoft Windows, Identity and Access Management, Risk Management Framework, Encryption, Good Clinical Practices (GCP)
Beginner · Course · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months