
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

Princeton University
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Payment Systems, FinTech, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Digital Assets, Network Protocols, Transaction Processing, Data Storage, Process Analysis, Distributed Computing, Emerging Technologies, Scripting, Application Specific Integrated Circuits, Financial Policy, Financial Regulation
Mixed · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cloud Applications, Security Testing, Cyber Security Strategy, Email Security, SQL
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
Beginner · Specialization · 3 - 6 Months

LearnQuest
Skills you'll gain: Blockchain, Security Controls, Cybersecurity, Data Security, Network Security, Security Architecture Review, Cryptography, IT Security Architecture, Vulnerability Assessments, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Network Security, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Key Management, Vulnerability Assessments, Authorization (Computing), Code Review, Dependency Analysis
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
Intermediate · Course · 1 - 4 Weeks