
Skills you'll gain: Linux Administration, Linux, User Accounts, Authentications, Virtual Machines, Virtualization, Operating System Administration, Security Controls, System Configuration, Command-Line Interface, Configuration Management
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Threat Modeling, Security Awareness, Cyber Threat Intelligence, Threat Management, Network Security, Information Privacy, Malware Protection, Incident Response, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Order Management, ASP.NET, .NET Framework, Authentications, User Interface and User Experience (UI/UX) Design, User Interface (UI), User Accounts, Authorization (Computing), E-Commerce, Bootstrap (Front-End Framework), Payment Systems, Payment Processing and Collection, Model View Controller, Debugging
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Malware Protection, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Network Security, Personally Identifiable Information, Authentications, Data Security, Mobile Security, Identity and Access Management
Beginner · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Application Security, Public Key Cryptography Standards (PKCS), Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Brute-force attacks, Algorithms, User Provisioning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Enterprise Risk Management (ERM), Business Risk Management, Security Controls, System Implementation, Security Awareness, Information Privacy, Security Management, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Authorization (Computing), Identity and Access Management, User Accounts, Role-Based Access Control (RBAC), Multi-Factor Authentication, Group Policy, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Infrastructure, Network Performance Management, Authentications, Identity and Access Management, Encryption, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Wireless Networks
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks