
University of California, Irvine
Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Network Troubleshooting, Network Administration, Virtual Private Networks (VPN), Hardening, TCP/IP, Cybersecurity, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Technical Support and Services, Encryption, Command-Line Interface, Authentications, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Encryption, OSI Models, Network Architecture, Computer Networking, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Continuous Monitoring, Cybersecurity, Security Management, Network Security, Security Strategy, Risk Management Framework, Internet Of Things, Cyber Risk, Threat Management, Cyber Security Strategy, Infrastructure Security, Hardware Architecture, Security Engineering, Encryption, Communication Systems, Wireless Networks, Information Systems Security, Vulnerability Assessments, Risk Analysis, Network Infrastructure
Beginner · Specialization · 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Modeling, Secure Coding, Application Security, Blockchain, Vulnerability Assessments, Scalability, Application Design, Payment Systems, Verification And Validation, Transaction Processing, Cryptography, FinTech, Emerging Technologies
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cloud Security, Identity and Access Management, AWS Identity and Access Management (IAM), Incident Response, Cloud Computing, Cloud Computing Architecture, Data Security, Application Security, Network Security, Encryption, Role-Based Access Control (RBAC), Amazon Web Services, Key Management, Infrastructure Security, Security Controls, Firewall, Continuous Monitoring, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months