
Coursera
Skills you'll gain: Security Controls, Vulnerability Scanning, ISO/IEC 27001, Penetration Testing, Vulnerability Assessments, Security Information and Event Management (SIEM), Data Security, Compliance Auditing, Security Assertion Markup Language (SAML), Risk Management Framework, Computer Security Incident Management, Multi-Factor Authentication, Authentications, Computer Security Awareness Training, Single Sign-On (SSO), Event Monitoring, Authorization (Computing), Encryption, Advanced Encryption Standard (AES), End User Training and Support
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Authentications, Application Security, Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Cloud Security, Threat Management, Infrastructure Security, Exploitation techniques, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis
Intermediate · Specialization · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, File Systems, Operating System Administration, Linux Commands, Operating Systems, User Accounts, Red Hat Enterprise Linux, OS Process Management, User Provisioning, File Management, Unix Shell, Shell Script, System Software, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, grep, Virtualization
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Simulations, Scenario Testing, Security Testing, Security Controls, Vulnerability Management, Incident Response
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

California Institute of the Arts
Skills you'll gain: Information Architecture, Persona (User Experience), UI/UX Strategy, User Experience Design, Web Design, User Interface and User Experience (UI/UX) Design, User Experience, Wireframing, User Interface (UI), User Research, UI/UX Research, Web Design and Development, User Centered Design, Design Strategies, Persona Development, Design Research, Mockups, Usability Testing, Software Development Methodologies, Target Audience
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Application Security, Data Security, Information Systems Security, Internet Of Things, Threat Modeling, Cybersecurity, Cloud Security, Security Engineering, Cryptography, Secure Coding, Network Security, Cyber Attacks, Mobile Security, Vulnerability, Risk Management Framework, Threat Management, Encryption, Cloud Services, Web Applications, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Operating System Administration, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Security Software, Linux Commands, File Management, Network Administration, Active Directory, System Monitoring, System Configuration, OS Process Management, Network Security, Command-Line Interface, Malware Protection
Mixed · Course · 1 - 4 Weeks

Universidad Nacional Autónoma de México
Skills you'll gain: NoSQL, Database Systems, MongoDB, Database Software, Database Management Systems, Databases, Database Design, Database Theory, Relational Databases, Query Languages, Apache Cassandra, Data Storage Technologies, Scalability, Graph Theory, Unstructured Data, Maintainability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence
Intermediate · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Open Source Technology, Linux, Package and Software Management, Shell Script, Linux Administration, Ubuntu, Linux Commands, Microsoft Windows, Unix Shell, User Accounts, Bash (Scripting Language), Command-Line Interface, Linux Servers, Systems Administration, Unix, Operating Systems, Desktop Support, Windows Servers, System Configuration, Security Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months