
Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cyber Security Assessment, Brute-force attacks, Python Programming, Programming Principles, Scripting, Algorithms, Data Structures, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Public Key Infrastructure, Network Monitoring, Encryption, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Key Management, Encryption, Windows Servers, Infrastructure Security, Active Directory, Network Infrastructure, Authentications, Cybersecurity, System Configuration, Configuration Management, Data Integrity
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, Cryptography, System Configuration, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Threat Modeling, AI Enablement, AI Personalization, Artificial Intelligence, Incident Response, Deep Learning
Beginner · Course · 1 - 4 Weeks