
Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Workplace inclusivity, Diversity Equity and Inclusion Initiatives, Empowerment, Resilience, Personal Development, Self-Awareness, Teamwork, Collaboration, Constructive Feedback, Relationship Building, Active Listening, Interpersonal Communications
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, Endpoint Detection and Response, Security Management, Infrastructure Security, Microsoft Servers, Threat Detection, Information Systems Security, Security Information and Event Management (SIEM), Windows Servers, System Monitoring, Payment Card Industry (PCI) Data Security Standards, Configuration Management, Virtual Machines, Disaster Recovery
Beginner · Course · 1 - 3 Months

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Cryptography
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks