
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Cybersecurity, TCP/IP, Network Protocols, Data Security, Litigation Support, Network Security, General Networking, Record Keeping, Data Storage, Data Integrity, Cryptography, File Management, File Systems, Encryption, Data Validation, Command-Line Interface, Technical Writing, Linux Commands, Unix Commands, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Wireless Networks, Cloud Computing, Network Monitoring, Network Security, Event Monitoring, Network Performance Management, Software-Defined Networking, Ansible, Network Architecture, Virtualization, Network Protocols, Encryption, Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Restful API
Advanced · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Data Integrity, Encryption, FinTech, Network Security, Transaction Processing, Data Structures, Emerging Technologies
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Microsoft Copilot, Application Security, Data Validation, Web Applications, Security Controls, Web Development, Vulnerability Assessments, Data Security, Encryption
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Security Strategy, Security Controls, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Vulnerability Assessments, Threat Detection, Cloud Management, Encryption, Security Information and Event Management (SIEM), Identity and Access Management, Incident Response
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis, Encryption
Intermediate · Course · 3 - 6 Months