
Empower School of Health
Skills you'll gain: Health Technology, Healthcare Ethics, Data Ethics, Telehealth, Medical Privacy, Surgery, Health Informatics, Health Disparities, Health Care Procedure and Regulation, Ethical Standards And Conduct, Health Care Administration, Public Health, Public Health and Disease Prevention, Regulation and Legal Compliance, Information Privacy, Health Equity, Medical Equipment and Technology, Informed Consent, Health Policy, Digital Transformation
Intermediate · Specialization · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, Security Testing, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Firewall, Intrusion Detection and Prevention, Network Security, Cloud Security, Infrastructure Security, Threat Detection, Cyber Security Policies
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Operating System Administration, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Threat Management, General Networking, Windows PowerShell, Cyber Governance, Unix Commands
Beginner · Specialization · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Data Security, Emerging Technologies, Enterprise Security, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months