
University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months

The University of Notre Dame
Skills you'll gain: Active Listening, Conflict Management, Communication Strategies, Business Communication, Case Studies, Business Ethics, Interpersonal Communications, Crisis Management, Strategic Communication, Communication, Ethical Standards And Conduct
Mixed · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Non-Verbal Communication, Interpersonal Communications, Technical Communication, Verbal Communication Skills, Target Audience, Strategic Communication, Communication, Business Communication, Persuasive Communication, Professional Development, Leadership, Influencing, Organizational Leadership, Active Listening, Culture, Overcoming Obstacles
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Virtual Teams, Telecommuting, Interpersonal Communications, Trustworthiness, Collaboration, Team Building, Social Skills, Rapport Building, Communication, Teamwork, Relationship Building, Team Leadership, Leadership, Leadership Development, Expectation Management
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
Mixed · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks