
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Security Controls, Governance Risk Management and Compliance, Risk Management, Business Risk Management, Compliance Management, Compliance Auditing, Enterprise Risk Management (ERM), Data Security, Information Privacy, Continuous Monitoring, Auditing, Information Systems Security, Regulatory Compliance, Verification And Validation, Risk Analysis, Document Management, Scope Management, Asset Protection
Beginner · Course · 1 - 3 Months
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Requirements Analysis, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Data Flow Diagrams (DFDs), Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Development Life Cycle, Technical Design
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Authentications, Unit Testing, Application Security, Security Testing, Authorization (Computing), Secure Coding, Identity and Access Management, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, iOS Development, Secure Coding, Encryption, Network Security, Application Programming Interface (API), Swift Programming, Mobile Security, Application Security, Data Persistence, Key Management, Data Security, Data Storage
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management Framework, Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Computer Security Incident Management, Threat Management, OSI Models, Business Risk Management, Disaster Recovery, Cryptography, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Authentications, Application Security, Network Security, Exploitation techniques, File Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Role-Based Access Control (RBAC), Splunk, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Identity and Access Management, Lightweight Directory Access Protocols, Authorization (Computing), Security Controls, Data Access, User Accounts, Scripting, Proxy Servers
Beginner · Course · 1 - 4 Weeks