
Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Threat Intelligence, Cyber Risk, Virtual Private Networks (VPN), Social Media
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
Beginner · Specialization · 3 - 6 Months
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Computer Security Awareness Training, Security Awareness, Firewall, Information Assurance, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
Beginner · Specialization · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months