
Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Teams, Data Loss Prevention, Data Governance, Compliance Management, Role-Based Access Control (RBAC), Collaborative Software, Windows PowerShell, Security Management, Identity and Access Management, System Monitoring, System Configuration, Event Monitoring, Legal Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: File I/O, Git (Version Control System), Software Development Methodologies, JUnit, Requirements Analysis, Version Control, Application Development, Software Development Life Cycle, SQL, Full-Stack Web Development, Test Driven Development (TDD), Software Development, Restful API, Object Oriented Programming (OOP), Object Oriented Design, Cloud Deployment, Database Management, Digital Transformation, Java Programming, Generative AI
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Cloud Development, Identity and Access Management, Secure Coding, Security Awareness, Security Testing, Data Security, Cloud Deployment, User Provisioning, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Authentications, Multi-Factor Authentication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Information Systems Security, Key Management, Network Security, Information Privacy, Authentications, Digital Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Data Security, Cybersecurity, Cloud Computing, Authentications, Google Cloud Platform, Authorization (Computing), Data Encryption Standard, Threat Detection, Infrastructure Security, Regulatory Compliance, Compliance Management, Identity and Access Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks