
Skills you'll gain: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Video Editing, Editing, Video Production, Cinematography, Storytelling
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Laboratory Testing, Quality Assurance, Semiconductors, Electrical Engineering, Manufacturing Processes, Electronics, Materials science, Process Engineering, Process Control, Test Engineering, Analytical Testing, Chemistry, Mechanical Engineering
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Dassault Systèmes
Skills you'll gain: SolidWorks (CAD), Computer-Aided Design, Drafting and Engineering Design, Engineering Drawings, 3D Modeling, Mechanical Engineering
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Secure Coding, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Scripting, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Site Reliability Engineering, Incident Management, AI Security, MLOps (Machine Learning Operations), Model Deployment, Patch Management, Problem Management, DevOps, System Monitoring, Continuous Monitoring, Dependency Analysis, Sprint Retrospectives, Disaster Recovery, Artificial Intelligence, Vulnerability Assessments, Automation, Dashboard
Intermediate · Course · 1 - 4 Weeks