
Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, AWS Identity and Access Management (IAM), Encryption, Personally Identifiable Information, Data Security, Authentications, Threat Detection, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Blockchain, Digital Assets, FinTech, Business Modeling, Payment Systems, Business Transformation, Transaction Processing, Identity and Access Management, Contract Management, Security Controls
Beginner · Course · 1 - 4 Weeks
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
Mixed · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Infrastructure Security, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Security Testing, Virtual Private Networks (VPN)
Intermediate · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Incident Response, IT Security Architecture, Secure Coding, Application Security, Identity and Access Management, Information Systems Security Assessment Framework (ISSAF), Security Testing, Continuous Monitoring, Information Systems Security, Network Security, Security Strategy, Zero Trust Network Access, Security Awareness, Security Information and Event Management (SIEM), Risk Management Framework, Disaster Recovery, Security Controls, Cybersecurity, Enterprise Architecture
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability, Computer Science
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering Tools, Security Software, Systems Design, Software Engineering, Software Development Life Cycle, Technical Design
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Event Monitoring, Cloud Security, Server Administration, System Configuration, Performance Testing, Scenario Testing
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks