
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Networking Hardware, OSI Models, Network Architecture, Network Protocols, Network Security, TCP/IP, Computer Networking, Local Area Networks, Virtual Private Networks (VPN), Wireless Networks, Network Routing, Wide Area Networks, Network Switches, Virtual Local Area Network (VLAN), Firewall
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Administration, Virtual Local Area Network (VLAN), General Networking, TCP/IP, Local Area Networks, Computer Networking, Command-Line Interface, Network Infrastructure, Wireless Networks, Network Security, Network Switches, OSI Models, Network Routing, Network Protocols, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Networking Hardware, General Networking, Network Infrastructure, Local Area Networks, OSI Models, Network Protocols, Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), TCP/IP, Network Architecture, Computer Networking, Network Model, Wireless Networks, Network Security, Network Switches, Virtual Local Area Network (VLAN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, Cloud Services, General Networking, Linux, Windows PowerShell, Virtual Machines
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months