
Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery
Intermediate · Specialization · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Vulnerability Assessments, General Networking, Authorization (Computing), Web Applications, Authentications
Mixed · Course · 1 - 4 Weeks

Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Identity and Access Management, Security Controls, System Configuration, Network Monitoring, Enterprise Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months