
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (600) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Governance Risk Management and Compliance, Vulnerability Scanning, Information Technology Architecture, Business Continuity Planning, Law, Regulation, and Compliance, Threat Management, Cyber Security Assessment, Computer Security Awareness Training, Cyber Risk, Contingency Planning, Compliance Management, Internal Controls, Governance, Continuous Monitoring, Data Management, Computer Security, Key Performance Indicators (KPIs), Regulatory Requirements, Human Factors (Security), Artificial Intelligence
★ 4.9 (53) · Intermediate · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Security Management, Security Controls, Asset Management, Security Strategy, IT Management, Program Management, Security Awareness, Computer Security Awareness Training, Cyber Security Strategy, IT Security Architecture, Information Management, Technology Roadmaps, Cyber Security Policies, Continuous Monitoring, Cybersecurity, Enterprise Security, Program Development, Vendor Management, Quality Management, Continuous Improvement Process
Mixed · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Software Development Life Cycle, Productivity Software, Risk Management Framework, digital literacy, Systems Design, Network Security, Computer Hardware, Agile Project Management, Hardware Architecture, Agile Software Development, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Productivity
★ 4.6 (341) · Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux, Linux Commands, Linux Administration, Cloud Computing Architecture, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Virtual Machines, Firewall, Virtualization, Knowledge of Apple Software, File Management, User Accounts
★ 4.6 (5.7K) · Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
★ 4.8 (26K) · Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Data Security, Threat Detection, Cybersecurity, Cyber Attacks, Cyber Risk, Data Management, Security Controls, Cyber Governance, Security Management, Encryption, Security Software, Cryptography, Data Sharing, Security Strategy, Network Security, Data Access, Risk Modeling, Statistical Methods
★ 4.2 (6) · Beginner · Course · 1 - 3 Months

John Wiley & Sons
Skills you'll gain: Security Management, Risk Management, Risk Management Framework, Compliance Management, Enterprise Risk Management (ERM), Risk Control, Security Strategy, Cyber Governance, Risk Analysis, Governance, Cybersecurity, Regulatory Compliance, Security Controls, Law, Regulation, and Compliance, Regulation and Legal Compliance, Management Reporting, Cyber Security Policies, Cyber Security Strategy, Performance Reporting, Incident Response
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management Framework, Risk Analysis, Risk Management, Cybersecurity, Incident Management, Network Security, Incident Response, Cloud Security, Cyber Attacks, Authentications, Business Continuity Planning, Information Systems Security, Application Security, Security Management, Threat Modeling, OSI Models, Threat Management, Disaster Recovery, Cryptography, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management
★ 4.9 (30) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Application Security, Security Testing, Security Strategy, Information Systems Security, Security Engineering, Security Controls, Software Architecture, Software Development Methodologies, Software Development Life Cycle, Business Strategies, Penetration Testing, Compliance Management
Beginner · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Audit Working Papers, Change Control, Internal Auditing, Systems Development, Auditors Report, Risk Management, Risk Control, FinTech, Change Management, Risk Mitigation, Emerging Technologies, Project Implementation, Development Environment
★ 4.7 (4K) · Beginner · Course · 1 - 4 Weeks