
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Malware Protection, Cybersecurity, Data Persistence, Network Analysis, Operating Systems, Virtual Environment
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Endpoint Detection and Response, Intrusion Detection and Prevention, Threat Detection, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Event Monitoring, Cyber Attacks, Cyber Security Assessment, Continuous Monitoring, Security Management, Malware Protection, Cyber Engineering, Security Testing, Cyber Governance, Linux
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cyber Threat Intelligence, Cybersecurity, Data Loss Prevention, Threat Detection, Information Privacy, Event Monitoring, Incident Response, Automation
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Incident Management, Disaster Recovery, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Digital Forensics, Business Continuity, Verification And Validation, Technical Communication
Beginner · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, Data Security, Risk Management, Software Development Methodologies, Process Design, Information Systems, Workflow Management, Business Systems Analysis, Microsoft Office, E-Commerce, Microsoft Excel
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Virtual Local Area Network (VLAN), Computer Displays, Peripheral Devices, TCP/IP, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), General Networking, USB, Wireless Networks, Computer Networking, Network Routers, Network Infrastructure, Hardware Troubleshooting, Network Switches, Network Protocols, Computer Hardware
Beginner · Course · 1 - 3 Months