
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, Intrusion Detection and Prevention, System Configuration, Digital Forensics, Virtual Machines
Intermediate · Course · 1 - 3 Months

Duke University
Skills you'll gain: Cloud Deployment, Technical Communication, Cloud Infrastructure, MLOps (Machine Learning Operations), Cloud-Native Computing, Cloud Applications, CI/CD, Cloud Platforms, Cloud Computing, Agile Software Development, DevOps, Technical Documentation, Infrastructure As A Service (IaaS), Microservices, Continuous Delivery, Applied Machine Learning, Cloud API, Google Cloud Platform, Model Deployment, Machine Learning
Intermediate · Specialization · 3 - 6 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Continuous Monitoring, Cloud Computing, Cryptography
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Healthcare Ethics, Responsible AI, Ethical Standards And Conduct, Computer Security Awareness Training, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Information Technology, Information Privacy, Diversity Equity and Inclusion Initiatives, Social Impact, Media and Communications, Automation, Robotics, Cultural Diversity, Personally Identifiable Information, Emerging Technologies
Build toward a degree
Beginner · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Open Web Application Security Project (OWASP), Cyber Attacks, Cyber Security Assessment, Network Security, Security Awareness, Information Systems Security, Application Security, Cyber Risk, Network Monitoring, Cloud Security, Linux Commands, Artificial Intelligence, ChatGPT
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cloud Computing Architecture, Cloud Computing, Cloud Services, Resource Allocation, Cloud Security, Infrastructure As A Service (IaaS), Cloud Deployment, Virtualization, Containerization, Software As A Service, Platform As A Service (PaaS), Brokerage, Scalability
Intermediate · Course · 1 - 3 Months

Northeastern University
Skills you'll gain: Responsible AI, Data Ethics, Artificial Intelligence, Data Governance, Law, Regulation, and Compliance, Machine Learning, Ethical Standards And Conduct, Data-Driven Decision-Making, Data Integrity, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Brute-force attacks, Information Systems Security, Cybersecurity, Virtual Machines, Virtual Environment, Network Analysis
Intermediate · Course · 1 - 3 Months