
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: File Management, Linux Administration, File Systems, OS Process Management, Linux, Linux Servers, Data Security, Authorization (Computing), Linux Commands, Data Loss Prevention, Operating System Administration, Continuous Monitoring, Information Systems Security, System Monitoring, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Ubuntu, Operating System Administration, Red Hat Enterprise Linux, Unix, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Network Administration, Software Installation, Package and Software Management, Authentications, Open Source Technology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Computer Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Network Administration, Security Software, Systems Administration, System Configuration, Authentications
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cyber Security Policies, Security Controls, Infrastructure Security, Threat Detection, System Monitoring, Linux Administration, Linux, Linux Commands, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Threat Management, Vulnerability Scanning, Data Security, Identity and Access Management, Security Management, User Provisioning, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection, Public Key Infrastructure
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Firewall, Network Security, Linux, Linux Administration, Security Controls, Hardening, Ubuntu, Linux Commands, File Management, Authorization (Computing), File Systems, System Configuration, Endpoint Security, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Devops Tools, Network Troubleshooting, Linux Servers, Linux Commands, Ansible, Kubernetes, Infrastructure as Code (IaC), Operating System Administration, Network Monitoring, Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Hardening
Advanced · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Threat Modeling, Information Systems Security, Cyber Engineering, Security Controls, Security Engineering, Security Architecture Review, Security Requirements Analysis, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Incident Response, Industrial Design
Beginner · Course · 1 - 3 Months