
Coursera
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Management, Security Controls, Cyber Security Strategy, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Enterprise Security, Information Assurance, Data Integrity
Beginner · Course · 1 - 4 Weeks

Knowledge Accelerators
Skills you'll gain: Cyber Security Policies, AI Security, Cybersecurity, Threat Management, Cyber Attacks, Cyber Risk, Email Security, Endpoint Security, Mobile Security, Remote Access Systems, Multi-Factor Authentication, Artificial Intelligence, Cloud Computing
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring
Beginner · Course · 1 - 3 Months

28DIGITAL
Skills you'll gain: Cybersecurity, Cyber Attacks, AI Security, Network Security, Information Systems Security, Data Ethics, Deep Learning, Responsible AI, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Machine Learning Methods, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Cybersecurity, Data Security, Cryptography, AI Security, Data Storage, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Security Management, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Mobile Security
Beginner · Course · 1 - 4 Weeks