
Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Cryptography, Key Management, Threat Modeling, Authorization (Computing), Encryption, Email Security, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Software Design Documents, System Design and Implementation, Internet Of Things, Technical Documentation, Technical Communication, Mobile Development, Test Case, System Testing, Software Development, Wireless Networks, Embedded Systems, Systems Integration
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Performance Tuning, Embedded Software, Embedded Systems, Debugging, Systems Engineering, Software Systems, System Software, Systems Architecture, Systems Design, System Design and Implementation, Software Testing, Software Quality Assurance, Linux
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, Data Governance, Data Management, Data Security, Secure Coding, Cloud Applications, Application Security, Identity and Access Management, Key Management, Multi-Factor Authentication, Encryption, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Information Management, Security Controls, Configuration Management, Security Engineering, Vulnerability Assessments, Security Requirements Analysis, Cloud Security, Software Development Life Cycle, Cloud Computing, System Implementation, Program Development, Change Control
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux, System Monitoring, System Support, Authorization (Computing), File Management, Network Security, Data Security
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Virtual Private Networks (VPN), Linux Administration, Public Key Infrastructure, Linux, Intrusion Detection and Prevention, Firewall, Remote Access Systems, Authentications, Authorization (Computing), Network Security, Security Controls, Identity and Access Management, File Management, Systems Administration, Cybersecurity, Encryption, Information Technology, Disaster Recovery
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, Network Architecture, TCP/IP, Cybersecurity, Networking Hardware, Computer Networking, Network Security, Threat Detection, Network Routers, Cyber Attacks, Network Switches, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months