
Skills you'll gain: Interviewing Skills, Professional Networking, Presentations, LinkedIn, Cybersecurity, Applicant Tracking Systems, Market Research, Social Media, Business Research, Recruitment, Portfolio Management, Job Analysis, Negotiation, Writing, Compensation Strategy, Recruitment Strategies, Communication
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis, Encryption
Intermediate · Course · 3 - 6 Months

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Threat Modeling, Cyber Risk, Security Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
Beginner · Course · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, Cloud Services, General Networking, Linux, Windows PowerShell, Virtual Machines
Beginner · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Business Priorities, Enterprise Security, Security Awareness, Security Management, Regulatory Compliance, Compliance Management, Risk Management, Communication
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months