
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity
Beginner · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Advanced · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Virtual Private Networks (VPN), Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, Performance Tuning, System Configuration, Cybersecurity, Malware Protection
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption
Beginner · Course · 1 - 4 Weeks