
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, ISO/IEC 27001, Threat Management, Cyber Governance, Risk Management Framework, Computer Security, Information Assurance, Security Controls, Enterprise Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Incident Management, Security Architecture Review, Application Security, Identity and Access Management, Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Systems Architecture, Security Management, Security Engineering, Zero Trust Network Access, Security Awareness, Risk Management Framework, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Security Testing, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Vulnerability Scanning, Operating Systems, Cyber Risk, Cloud Services, Exploitation techniques, General Networking, Cyber Governance, Cyber Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Endpoint Detection and Response, Network Administration, Cryptographic Protocols, IT Security Architecture, Cloud Security, Data Loss Prevention, Cloud Deployment, Cyber Attacks, Security Controls, Infrastructure Security, Computer Security, Encryption, Cloud Computing, Authorization (Computing), Network Planning And Design, Identity and Access Management, System Configuration, Data Security, Authentications, Malware Protection
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Model, Network Infrastructure, Firewall, Security Controls, Cloud Computing, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security, Systems Architecture, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Cybersecurity, Security Management, Network Security, Security Strategy, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, User Experience Design, Vulnerability Assessments, Database Theory, Unified Modeling Language, Unit Testing, UI/UX Research, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Data Flow Diagrams (DFDs), Relational Databases, Software Visualization, Security Engineering, Security Software, Systems Development Life Cycle, Software Development Life Cycle
Beginner · Specialization · 3 - 6 Months

University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Computer Security, Cloud Computing, Cybersecurity, Security Controls, Infrastructure Security, Remote Access Systems, Cyber Attacks, Public Key Infrastructure, Hardening, Cryptography, Vulnerability Management, Private Cloud, Cryptographic Protocols, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications
Beginner · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management
Beginner · Course · 1 - 3 Months