
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Google Cloud Platform, Firewall, Cloud Security, Network Troubleshooting, Infrastructure Security, Identity and Access Management, Threat Detection, Cloud Infrastructure
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Wireless Networks, Network Performance Management, Network Monitoring, Dynamic Host Configuration Protocol (DHCP), Ansible, Network Administration, Routing Protocols, Firewall, General Networking, Software-Defined Networking, Network Planning And Design, Virtual Local Area Network (VLAN), Network Switches, Network Protocols, System Configuration, Infrastructure as Code (IaC), Network Routers, Network Troubleshooting, Terraform
Advanced · Course · 3 - 6 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Cloud Computing Architecture, Virtual Machines, Cloud Computing, Firewall, Network Architecture, Virtual Private Networks (VPN), Mobile Security, Cloud Security, Wireless Networks, Network Protocols, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Amazon Web Services, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure Security, Cloud Security, Network Security, AWS Identity and Access Management (IAM), Application Security, Firewall, Amazon Elastic Compute Cloud, Endpoint Security, Vulnerability Management, Amazon CloudWatch
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks