
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Management, Configuration Management, Security Awareness, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Cybersecurity, Change Control, Safety and Security, Information Assurance, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Information Assurance, Security Controls, Data Integrity, Identity and Access Management, Network Security, IT Security Architecture, Authentications, Cybersecurity, Authorization (Computing), Infrastructure Security, Enterprise Security, User Provisioning
★ 4.5 (8) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Cyber Attacks, Information Assurance, Digital Forensics, Cyber Security Policies, Cyber Risk, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Key Management, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Threat Management, Security Testing, Secure Coding, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Cryptography, CI/CD, Cloud Platforms, DevOps, Vulnerability Assessments, Vulnerability Management, Penetration Testing, Configuration Management
Intermediate · Course · 3 - 6 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
★ 5 (6) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Law, Regulation, and Compliance, Risk Management Framework, Business Risk Management, Regulation and Legal Compliance, Risk Analysis, Legal Risk, Consulting, Risk Management, Investigation, Business Consulting, Security Strategy, Cyber Security Policies, Security Management, Crisis Management, Regulatory Requirements, Management Consulting, Enterprise Security, Threat Management, Business Planning, Compliance Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Application Security, Cloud Deployment, Internet Of Things, Infrastructure Security, Vulnerability Assessments, Cloud Services, DevOps
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Embedded Software, Security Engineering, Hardening, Embedded Systems, Information Systems Security, Security Controls, Network Security, Threat Modeling, Cybersecurity, Encryption, System Configuration, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Cryptography, Key Management, File Systems, Computer Hardware, Package and Software Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Systems Development Life Cycle, Security Architecture Review, Security Controls, Software Testing, Security Management, Software Development, Continuous Monitoring
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks