
University of Colorado Boulder
Skills you'll gain: Quantum computing, Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Cryptographic Protocols, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Mathematical Software, Advanced Mathematics
★ 4.6 (63) · Advanced · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: digital literacy, Systems Design, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Information Technology, Information Privacy
★ 4.5 (51) · Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Intrusion Detection and Prevention, Data Integrity, Algorithms, User Provisioning, Command-Line Interface
★ 4.5 (100) · Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Data Security, Security Controls, Health Care Procedure and Regulation, Computer Security Awareness Training, Cybersecurity, Cryptographic Protocols, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Cryptographic Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Routing Protocols, Virtual Private Networks (VPN), Security Controls, OSI Models, Dynamic Host Configuration Protocol (DHCP), Proxy Servers
★ 4.5 (8) · Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cryptography, Encryption, Application Development, Security Engineering, C and C++, C++ (Programming Language)
★ 4.2 (16) · Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Authentications, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Web Applications, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
★ 4.7 (351) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Telecommunications, Intrusion Detection and Prevention, Network Routers, Security Controls, Identity and Access Management, Mobile Security, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Operations, Vulnerability Scanning, Cyber Attacks, Computer Security, Vulnerability Assessments, Security Strategy, Cyber Security Policies, Network Security, Network Analysis, Network Protocols
★ 4.8 (14) · Intermediate · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
★ 5 (6) · Intermediate · Course · 1 - 3 Months