
University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Key Management, Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability
Mixed · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Azure Active Directory, MITRE ATT&CK Framework, Threat Modeling, Penetration Testing, Zero Trust Network Access, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Record Keeping, Authentications, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Regulatory Requirements, Cloud Computing, Business Software, Active Directory, Computer Security Incident Management
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Cryptographic Protocols, Encryption, Key Management, Cybersecurity, Computer Security, Information Assurance, Theoretical Computer Science, Threat Modeling, Communication Systems
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Graph Theory, Data Structures, Operations Research, Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Computational Thinking, Design Strategies, Cryptographic Protocols, Tree Maps, Encryption, Network Model, Combinatorics, Data Science, Computer Science, Mathematical Modeling, Mathematical Software, Python Programming
Build toward a degree
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Serverless Computing, Google Cloud Platform, Cloud Development, Cloud Applications, Cloud API, Cloud Security, Cloud Deployment, Cloud-Native Computing, Cloud Services, Cloud-Based Integration, Authorization (Computing), Authentications, Security Controls, Application Deployment, Operational Databases, Event-Driven Programming, Encryption
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Data Security, Threat Detection, Cybersecurity, Cyber Attacks, Cyber Risk, Data Management, Security Controls, Cyber Governance, Security Management, Encryption, Security Software, Cryptography, Data Sharing, Security Strategy, Network Security, Data Access, Risk Modeling, Statistical Methods
Beginner · Course · 1 - 3 Months