
Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Security Software, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Cloud Services, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Infrastructure Security, Encryption
Beginner · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Fraud detection, Sarbanes Oxley Act (SOX) Compliance, Financial Controls, Auditing, Financial Statement Analysis, Financial Statements, Financial Auditing, Internal Controls, Investigation, Internal Auditing, Financial Regulations, Compliance Management, Financial Analysis, Anomaly Detection, Financial Regulation, Risk Control, Business Ethics, Compliance Reporting, Case Studies, Advanced Analytics
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Google App Engine, Cloud Deployment, Application Deployment, Zero Trust Network Access, Cloud Security, Google Cloud Platform, Cloud Applications, Security Controls, Identity and Access Management, Cloud Computing, Network Security
Intermediate · Project · Less Than 2 Hours

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Security Strategy, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Cyber Security Assessment, Test Automation, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Intermediate · Course · 1 - 4 Weeks