
Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Network Administration, Virtual Machines, Cloud Computing, Firewall, Virtual Private Networks (VPN), Mobile Security, Network Troubleshooting, Computer Networking, Cloud Security, Wireless Networks, Peripheral Devices
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Database Management, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies, File Systems, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Ansible, Red Hat Enterprise Linux, Linux Administration, Hardening, Linux, Security Controls, Security Engineering, Authorization (Computing), Containerization, Computer Security, System Configuration, Context Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Threat Detection, Security Controls, Security Testing, Application Development, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Governance, Personally Identifiable Information, Information Privacy, Data Security, General Data Protection Regulation (GDPR), Data Ethics, Data Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Security Strategy, Compliance Management, Regulatory Compliance, Data Integrity, Risk Mitigation, Risk Analysis, Cross-Functional Collaboration, Encryption, Accountability
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Kubernetes, Cloud Security, Cloud Applications, Generative AI, Cloud Storage, Encryption, OAuth, Security Controls, Virtual Machines, Network Infrastructure, Cloud Computing, Containerization, Threat Management, Data Security
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months