
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, Cloud Services, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, Cloud Applications, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Security Controls, Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Cryptography, Web Applications, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Endpoint Detection and Response, Threat Detection, Incident Response, Cloud Security, Cyber Threat Intelligence, Computer Security Incident Management, Microsoft Azure, Security Information and Event Management (SIEM), Endpoint Security, Azure Active Directory, Incident Management, Security Controls, Multi-Cloud, Anomaly Detection, Email Security, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Automation, Query Languages
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Digital Forensics, Network Security, Incident Response, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Attacks, Cyber Security Policies, Regulatory Requirements, Cyber Security Assessment, Financial Industry Regulatory Authorities, Continuous Monitoring, Regulatory Compliance, Governance Risk Management and Compliance, Risk Analysis, Data Ethics, Emerging Technologies, Cloud Security, AI Security, Blockchain
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, IT Management, Systems Administration, Virtualization, Virtualization and Virtual Machines, Operating System Administration, Network Security, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Network Administration, Security Management, Computing Platforms, Network Infrastructure, Security Controls, Virtual Machines, Enterprise Architecture, Information Assurance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Incident Management, Data Centers, Computer Security Incident Management, DevSecOps, Continuous Monitoring, System Monitoring, Threat Detection, Infrastructure Security, IT Security Architecture, Security Management, Payment Card Industry (PCI) Data Security Standards, Data Security, Information Systems Security, IT Infrastructure, Security Information and Event Management (SIEM), Security Testing, DevOps, System Configuration, IT Automation
Beginner · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Computer Security Incident Management, Continuous Monitoring, Incident Response, Security Awareness, Security Management, Malware Protection, Network Security, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Security Controls, Cyber Attacks, Incident Response, Digital Forensics, Risk Management Framework, Exploitation techniques, Network Security, Threat Management, Computer Security Incident Management, Network Monitoring, Event Monitoring, Network Analysis, Firewall, Data Integrity
Intermediate · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Business Systems Analysis, Systems Analysis, Requirements Analysis, Business Requirements, Business Analysis, Business Systems, Business Analysis Tools, Process Flow Diagrams, User Requirements Documents, Data Modeling, Data Flow Diagrams (DFDs), Business Process Modeling, Diagram Design, Process Modeling, Feasibility Studies, Decision Making
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security
Build toward a degree
Intermediate · Course · 1 - 4 Weeks