
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Firewall, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Identity and Access Management, Network Protocols, Authorization (Computing), Scripting, Authentications, Automation, Test Planning, Encryption, Data Modeling
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, CI/CD, Cloud Platforms, Vulnerability Assessments, Vulnerability Management, Penetration Testing, Cybersecurity, Configuration Management
Intermediate · Course · 3 - 6 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Security Controls, Security Testing, Containerization, Software Development, CI/CD, Cybersecurity, Vulnerability Management, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Malware Protection, Network Security, Information Systems Security, Security Controls, Cybersecurity, Data Security, Mobile Security, Computer Security Awareness Training, Wireless Networks, Authentications, Human Factors (Security), Threat Detection, Encryption, User Accounts
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: JUnit, Apache Maven, Unit Testing, Spring Framework, Spring Boot, Restful API, API Testing, Software Testing, Test Case, Gradle, Software Development Tools, Integration Testing, Mockups, JSON, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Network Troubleshooting, Network Administration, Virtual Private Networks (VPN), Hardening, TCP/IP, Cybersecurity, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Technical Support and Services, Encryption, Command-Line Interface, Authentications, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours