
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Package and Software Management, Linux Administration, Linux, User Accounts, Command-Line Interface, Operating System Administration, Open Source Technology, Disaster Recovery, Red Hat Enterprise Linux, System Monitoring, Unix Commands, System Configuration, Identity and Access Management, Data Storage Technologies, Systems Administration, Linux Commands, Configuration Management, Patch Management, Security Controls, Software Installation
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Data Security, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: File Management, Linux Administration, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Continuous Monitoring, Information Systems Security, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Intrusion Detection and Prevention, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks