
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Threat Management, Risk Management Framework, Cyber Security Assessment, Security Controls, Enterprise Security, Information Privacy
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Cross Platform Development, Development Testing, Configuration Management, JSON
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Compliance Training, Risk Mitigation, Risk Management Framework, Business Risk Management, Cyber Governance, Regulatory Compliance, Data Security, Compliance Auditing, Security Testing, Cyber Risk, Cyber Security Policies, Governance, Regulation and Legal Compliance, Continuous Monitoring, Law, Regulation, and Compliance
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Record Keeping, Cyber Security Policies, Security Management, Data Management, Cloud Management, Records Management, Cloud Computing Architecture, Cloud Standards, IT Security Architecture, Data Security, General Data Protection Regulation (GDPR), Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Security Controls, Threat Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Cyber Engineering, Security Controls, Security Engineering, Security Architecture Review, Security Requirements Analysis, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Industrial Design
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, Security Controls, Procedure Development, Regulation and Legal Compliance, Program Standards
Mixed · Course · 1 - 4 Weeks

Coursera
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Cyber Governance, ISO/IEC 27001, Continuous Monitoring, Compliance Management, Cyber Risk, Cyber Security Policies, Incident Response, Cloud Security, Cybersecurity, Data Governance, Computer Security Incident Management, Cloud Management, Security Controls, Cloud Standards, Risk Management Framework, IT Management, Information Privacy, Security Awareness
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
Beginner · Course · 1 - 4 Weeks