
Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, Transaction Processing, Authentications, FinTech, Data Security, Emerging Technologies, Data Integrity, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Health Information Management, Regulatory Compliance, Data Management, Healthcare Industry Knowledge, Health Care, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Security, Telehealth, Security Management, Information Privacy, Electronic Medical Record, Threat Management, Emerging Technologies, Information Technology
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, Hardening, Key Management, Data Security, Cloud Security, Security Management, Security Controls, Encryption, Authorization (Computing), Identity and Access Management, Data Management, System Configuration, Servers, Configuration Management, Database Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Information Systems Security, Key Management, Encryption, Data Integrity, Distributed Computing, Transaction Processing, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Cryptography, Application Security, Network Security, Data Security, Security Engineering, Secure Coding, Information Systems Security, Infrastructure Security, Encryption, Cybersecurity, Threat Modeling, Vulnerability Assessments
Advanced · Course · 1 - 3 Months