
Skills you'll gain: Vulnerability Assessments, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Hardening, Risk Analysis
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, Cloud Infrastructure, Cloud Services, Big Data, Apache Spark, Cloud Computing, Cloud Storage, Cloud Platforms, Network Architecture, Data Storage Technologies, Computer Networking, File Systems, Apache Hadoop, Network Infrastructure, Cloud Applications, Infrastructure As A Service (IaaS), Middleware, Data Storage, Software-Defined Networking, NoSQL
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis
Intermediate · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cloud Security, Encryption, Network Security, Cloud Platforms, Identity and Access Management, DevSecOps, Cloud Computing, Cloud Infrastructure, Infrastructure Security, Zero Trust Network Access, IT Security Architecture, Virtual Private Networks (VPN), Amazon S3, Data Security, Multi-Cloud, AWS Identity and Access Management (IAM), Google Cloud Platform, Data Encryption Standard, Azure Active Directory, Threat Management
Beginner · Course · 3 - 6 Months

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Northeastern University
Skills you'll gain: Responsible AI, Data Ethics, Data Governance, Artificial Intelligence, Dependency Analysis, Information Privacy, Law, Regulation, and Compliance, Personally Identifiable Information, Ethical Standards And Conduct, General Data Protection Regulation (GDPR), Artificial Intelligence and Machine Learning (AI/ML), Data-Driven Decision-Making, Risk Management Framework, Diversity Awareness, Algorithms
Intermediate · Course · 1 - 4 Weeks