
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
★ 4 (10) · Intermediate · Specialization · 3 - 6 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, Data Security, Cryptography, Security Controls, Cryptographic Protocols
★ 4.9 (46) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cryptography, Encryption, Python Programming, Data Security
★ 4.8 (15) · Intermediate · Guided Project · Less Than 2 Hours

Infosec
Skills you'll gain: OSI Models, Network Troubleshooting, Network Administration, General Networking, Network Infrastructure, Network Monitoring, Network Security, TCP/IP, Virtual Networking, Local Area Networks, Routing Protocols, Network Routing, Virtual Local Area Network (VLAN), Wireless Networks, Networking Hardware, Disaster Recovery, Network Protocols, Network Switches, Cloud Services
Mixed · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Key Management, Encryption, Windows Servers, Cryptographic Protocols, Infrastructure Security, Web Servers, Active Directory, Digital Communications, Microsoft Servers, Network Infrastructure, Authentications, Server Administration, System Configuration, Data Integrity, Data Migration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Controls, Cryptographic Protocols, Security Management, Data Access, Vulnerability Assessments, Encryption, Vulnerability Management, Big Data, Authorization (Computing), Identity and Access Management, Cyber Risk
★ 4.7 (587) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Audit Planning, Auditing, Information Assurance, Project Management, Security Awareness, Compliance Auditing, Internal Auditing, Generally Accepted Auditing Standards, Control Objectives for Information and Related Technology (COBIT), Risk Analysis, Risk Management, Risk Control
★ 4.3 (11) · Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies
★ 4.3 (693) · Mixed · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, MITRE ATT&CK Framework, Responsible AI, Threat Modeling, Threat Detection, Threat Management, Data Ethics, Artificial Intelligence, ChatGPT, Information Privacy, Large Language Modeling
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
★ 4.4 (25) · Intermediate · Course · 1 - 3 Months