
University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Ubuntu, Operating System Administration, Red Hat Enterprise Linux, Unix, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Network Administration, Software Installation, Package and Software Management, Authentications, Open Source Technology
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Cloud Management, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Cloud API, Cloud Services, Linux Servers, Apache, Web Servers, System Configuration, Command-Line Interface, Firewall, Debugging
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Amazon Web Services, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure Security, Cloud Security, Network Security, Application Security, Firewall, Amazon Elastic Compute Cloud, Endpoint Security, Data Security, Security Controls, Network Monitoring, Vulnerability Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, IT Security Architecture, DevSecOps, Security Controls, Security Information and Event Management (SIEM), AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Infrastructure Security, Cyber Security Assessment, Identity and Access Management, Cyber Security Policies, Cloud Computing, Vulnerability Management, Continuous Monitoring, Network Security, NIST 800-53, Authorization (Computing), Threat Detection, Auditing, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Vendor Management, Vendor Relationship Management, Supplier Risk Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Risk Mitigation, Computer Security Awareness Training, Security Controls, Human Factors (Security), Asset Protection, Cyber Risk, Cybersecurity, Mergers & Acquisitions, Due Diligence
Mixed · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, Cloud Services, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, Cloud Applications, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Zero Trust Network Access, Network Security, Endpoint Security, General Networking, TCP/IP, Network Infrastructure, Firewall, Security Controls, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Encryption, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Security Controls, Risk Management Framework
Advanced · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Cyber Operations, Cyber Attacks, Cyber Security Strategy, Threat Detection, Security Controls, Cyber Security Assessment, Threat Management, Intrusion Detection and Prevention, Computer Security, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Event Monitoring, Endpoint Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months