
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, AI Security, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Amazon S3, Data Security, Multi-Cloud, Data Storage, AWS Identity and Access Management (IAM), Microsoft Azure, Cloud Storage, Data Encryption Standard
Beginner · Course · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Compliance Auditing, Event Monitoring, Application Security, Cyber Security Policies, Cyber Risk, Computer Security, Governance, Data Security, Information Systems Security, Infrastructure Security, Mobile Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
Beginner · Course · 1 - 4 Weeks