
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Internet Of Things, Network Security, Application Security, Security Engineering, Information Systems Security, Data Security, Cloud Services, Infrastructure Security, Security Controls, Cloud Computing, Application Design, Time Series Analysis and Forecasting, Encryption, Cryptography, Data Analysis, Identity and Access Management, Data Integrity, Authentications, Predictive Analytics
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: User Research, Persona (User Experience), User Experience, Verification And Validation, Usability Testing, User Centered Design, Human Computer Interaction, User Interface (UI) Design, Embedded Systems, Wireframing, Prototyping
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Computer Networking, Network Protocols, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: API Design, Restful API, Middleware, Application Deployment, Software Testing, Postman API Platform, Microsoft Azure, Cloud Development, Software Documentation, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Internet Of Things, Information Systems Security, Automation, Embedded Software, Real Time Data, Systems Integration, Emerging Technologies, Data Integration, Interoperability, Cloud Services, Scalability
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Agile Methodology, Scrum (Software Development), Software Testing, Agile Software Development, Embedded Systems, Docker (Software), Git (Version Control System), Linux Administration, System Programming, Linux, C++ (Programming Language), Internet Of Things, File Systems
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks