Duke University
Skills you'll gain: File I/O, UI Components, Java Programming, Object Oriented Design, Software Design, Debugging, Web Design and Development, Software Engineering, Code Reusability, Hypertext Markup Language (HTML), Computer Programming, Program Development, Event-Driven Programming, Bioinformatics, Encryption, Computer Programming Tools, Javascript, Algorithms, Data Analysis, Cascading Style Sheets (CSS)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: vSphere Networking and Storage, Virtual Networking, VMware ESX Servers, vCenter Server, vCenter Server Management, Virtual Machines, Virtualization, Storage vMotion, Virtualization and Virtual Machines, Infrastructure Security, Hardening, Role-Based Access Control (RBAC), Data Storage, Identity and Access Management, IT Infrastructure, Windows PowerShell, Encryption, Cyber Security Policies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Endpoint Detection and Response, Cyber Attacks, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Data Encryption Standard, Application Security, Data Security, Information Technology, Cyber Security Strategy, Authentications, Penetration Testing, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Serverless Computing, Google Cloud Platform, Cloud Development, Cloud Applications, Cloud API, Cloud Security, Cloud Deployment, Cloud-Native Computing, Cloud Services, Cloud-Based Integration, Authorization (Computing), Authentications, Security Controls, Application Deployment, Operational Databases, Event-Driven Programming, Encryption
Intermediate · Course · 1 - 3 Months

University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Key Management, Encryption, Cybersecurity, Arithmetic, Algorithms, Algebra, Python Programming
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Security Controls, Multi-Factor Authentication, Security Management, Authorization (Computing), User Accounts, Content Management Systems, User Provisioning, Identity and Access Management, Data Security, Authentications, Data Management, Data Access, IT Security Architecture, Encryption
Intermediate · Course · 3 - 6 Months

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Network Security, Secure Coding, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Key Management, Vulnerability Assessments, Authorization (Computing), Code Review, Dependency Analysis
Advanced · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Cryptography, Application Security, Encryption, Secure Coding, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Solution Design, Cyber Governance, Vulnerability Assessments, Code Review, Authorization (Computing), Data Integrity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Brute-force attacks, Vulnerability Assessments, AI Integrations, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months