
Microsoft
Skills you'll gain: Cloud Security, Data Management, Records Management, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Threat Management, Disaster Recovery, Data Governance, Security Controls, Information Privacy, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Key Management, Application Security, Python Programming, Scripting, Algorithms, Data Integrity
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis
Intermediate · Course · 3 - 6 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
Beginner · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Anomaly Detection, Natural Language Processing, Machine Learning, Deep Learning, Supervised Learning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), IT Management, Risk Mitigation, Cybersecurity, Cyber Security Strategy, Vulnerability Assessments, Compliance Management, Information Technology
Beginner · Course · 1 - 3 Months