
Illinois Tech
Skills you'll gain: Virtualization, Cloud-Native Computing, Network Security, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Virtual Machines, Network Troubleshooting, Cloud Platforms, Cloud Storage, Hyper-V, Virtual Networking, Software-Defined Networking, Cloud Infrastructure, VMware ESX Servers, Network Monitoring, Threat Modeling, Data Centers, Cloud Security
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: AI Security, Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Threat Modeling, Cyber Security Assessment, Risk Analysis, Application Security, Vulnerability Assessments, Network Security
Beginner · Course · 1 - 4 Weeks

Edureka
Beginner · Course · 1 - 4 Weeks

FAIR Institute
Skills you'll gain: Cyber Risk, Threat Management, Continuous Monitoring, Cyber Security Strategy, Risk Management, Risk Appetite, Enterprise Risk Management (ERM), Governance Risk Management and Compliance, Cybersecurity, Business Risk Management, Risk Modeling, Risk Control, Risk Analysis, Governance, Program Implementation, Automation, Benchmarking
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Intermediate · Guided Project · Less Than 2 Hours

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months
University of Michigan
Skills you'll gain: Data Quality, Quantitative Research, Data Validation, Data Integrity, Data Governance, Data Collection, Quality Assurance, Data Processing, Data Strategy, Data Analysis, Data Management, Model Evaluation, Data Preprocessing, Data Access, Statistical Analysis, Sampling (Statistics), Verification And Validation, Design Strategies, Threat Detection
Beginner · Specialization · 1 - 3 Months

DeepLearning.AI
Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, AI Security, Application Security, Risk Management Framework
Beginner · Project · Less Than 2 Hours

FAIR Institute
Skills you'll gain: Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Risk Analysis, Cyber Security Strategy, Cybersecurity, Governance Risk Management and Compliance, Insurance, Compliance Management, Business Communication, Technical Communication, Strategic Communication, Business Reporting
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Intermediate · Course · 1 - 3 Months