
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols
Build toward a degree
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, MITRE ATT&CK Framework, Cybersecurity, Cyber Attacks, Real-Time Operating Systems, Internet Of Things, Infrastructure Security, Network Security
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Network Security, Security Awareness, Remote Access Systems, Mobile Security, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Generative AI, Generative Model Architectures, System Monitoring, Data Ethics, Responsible AI, LLM Application, Cybersecurity, Artificial Intelligence, Prompt Engineering, Image Analysis, Threat Detection, Emerging Technologies, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
Intermediate · Course · 1 - 4 Weeks