
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months
Multiple educators
Skills you'll gain: Unit Testing, Data Structures, Event-Driven Programming, Interactive Data Visualization, Java, Java Programming, User Interface (UI), Object Oriented Programming (OOP), Debugging, Object Oriented Design, Computer Programming, Cryptography, Software Engineering, Performance Tuning, Encryption, Algorithms, Programming Principles, Data Analysis, Software Design, Problem Solving
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Windows Servers, Web Servers, Active Directory, Network Infrastructure, Authentications, Cybersecurity, Server Administration, Data Encryption Standard
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Security Awareness, Cybersecurity, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Cloud Security, Containerization, Infrastructure Security, Microservices, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Cloud Computing Architecture, Cloud Security, Cloud Solutions, Cloud Infrastructure, Cloud Computing, Identity and Access Management, Data Loss Prevention, Infrastructure as Code (IaC), Scalability, Serverless Computing, Personally Identifiable Information, System Monitoring, Event-Driven Programming, Encryption, Real Time Data
Advanced · Course · 1 - 4 Weeks

University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
Beginner · Course · 1 - 4 Weeks