
LearnKartS
Skills you'll gain: Identity and Access Management, Network Monitoring, Google Cloud Platform, Virtual Private Networks (VPN), General Networking, Network Troubleshooting, Virtual Local Area Network (VLAN), Network Security, Network Architecture, Network Routing, Cloud Computing, Cloud Security, Firewall, Key Management, Load Balancing, Cloud Storage, DevOps, Encryption, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Identity and Access Management, Vulnerability Management
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Salesforce, Authentications, Salesforce Development, Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, Data Security, Authorization (Computing), Event Monitoring, Application Security, Data Sharing, Security Information and Event Management (SIEM), Responsive Web Design, User Accounts, Mobile Development, User Interface (UI)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Security Testing, Security Engineering, Threat Management, Cybersecurity, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Computer Networking, Virtual Machines, Enterprise Architecture
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months