
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Security Awareness, Wireless Networks, Information Privacy, General Networking, Data Security, Emerging Technologies, Cyber Security Assessment, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Threat Modeling, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Vulnerability Assessments
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Systems Development Life Cycle, Software Development Life Cycle, Systems Development, Software Development Methodologies, Change Management, Project Management, System Implementation, Compliance Auditing, Software Testing, Auditing, Development Testing, Information Technology, Verification And Validation, Project Management Office (PMO), Internal Controls, Governance, Agile Methodology, Software Development, Data Integrity, Risk Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks