
Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, LLM Application, Site Reliability Engineering, Security Engineering, Anomaly Detection, Application Security, Responsible AI, Security Controls, Data Security, Incident Response, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Process Optimization
Intermediate · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Portfolio Management, Financial Analysis, Analysis, Data Analysis, Risk Management, Quantitative Research, Investment Management, Performance Analysis, Market Data, Return On Investment, Financial Modeling, Case Studies
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Rutgers the State University of New Jersey
Skills you'll gain: Market Analysis, Supplier Management, Competitive Analysis, Financial Analysis, Supply Chain Planning, Market Dynamics, Supply Chain Management, Risk Analysis, Financial Statements, Business Strategy, Case Studies, Peer Review
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Cloud Security, Disaster Recovery, Threat Management, Firewall, Security Management, Network Security, Cybersecurity, Cloud Services, AI Security, Network Monitoring, Security Strategy, Information Systems Security, Cloud Management
Advanced · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Data Sharing, Security Controls, Authentications
Beginner · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Business Communication, Case Studies, Data Visualization, English Language, Presentations, Report Writing, Business Writing, Business Analysis, Analysis, Communication, Public Speaking, Target Audience
Mixed · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cyber Governance, Security Awareness, Law, Regulation, and Compliance, Security Strategy, Human Factors (Security), Culture Transformation, Cyber Attacks, Mobile Security, Cyber Risk, Enterprise Security, Data Ethics, Cyber Security Strategy, Cybersecurity, Strategic Leadership, Cyber Operations, Leadership and Management, Leadership, Organizational Leadership, Leadership Development, Team Leadership
Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks