
Northeastern University
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Cyber Security Policies, Cryptography, Threat Modeling, Network Protocols, Data Security, OSI Models, Security Controls, Encryption, Public Key Infrastructure, TCP/IP, Data Storage Technologies, Zero Trust Network Access, Data Management, Governance Risk Management and Compliance
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Data Loss Prevention, Data Security, Continuous Monitoring, Payment Card Industry (PCI) Data Security Standards, Role-Based Access Control (RBAC), Encryption, Personally Identifiable Information, Firewall, Network Security, Security Management, Cloud Computing Architecture, Virtual Private Networks (VPN), Google Cloud Platform
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, Virtual Private Networks (VPN), Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Identity and Access Management, Encryption, Incident Response
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Role-Based Access Control (RBAC), Continuous Deployment, Capacity Management, Software Versioning, API Gateway, Scalability, Large Language Modeling
Intermediate · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Data Security, Encryption, Payment Card Industry (PCI) Data Security Standards, Security Controls, Cloud Solutions, Security Requirements Analysis, Network Security, Cloud Computing Architecture, Google Cloud Platform, CI/CD, Key Management, Virtual Private Networks (VPN), Firewall, Continuous Monitoring
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Software Documentation
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Internet Of Things, Real-Time Operating Systems, General Networking, Wireless Networks, Information Systems Security, Application Security, Petroleum Industry, Automation, Network Protocols, Emerging Technologies, Cloud Platforms, Embedded Systems, Market Analysis, Interviewing Skills, Software-Defined Networking, Workforce Development, Platform As A Service (PaaS)
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Package and Software Management, Linux Administration, Red Hat Enterprise Linux, File Systems, User Accounts, Linux Servers, Operating System Administration, Command-Line Interface, Shell Script, System Configuration, Open Source Technology, Disaster Recovery, Linux Commands, System Monitoring, Unix Commands, Identity and Access Management, Data Storage Technologies, Systems Administration, Web Servers
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months