
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Security Controls, Malware Protection, Threat Modeling, Network Security, Firewall, Digital Forensics, Code Review, Network Performance Management, Network Routing, Proxy Servers, Linux, Internet Of Things
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Containerization, Cloud Computing Architecture, Virtual Networking, Network Architecture, Role-Based Access Control (RBAC), Network Security, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Build toward a degree
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: AI Security, MITRE ATT&CK Framework, Responsible AI, Threat Modeling, Cybersecurity, Information Assurance, Threat Detection, Data Ethics, Artificial Intelligence, ChatGPT, Model Evaluation, Information Privacy
Beginner · Course · 1 - 4 Weeks

Stanford University
Skills you'll gain: Compassion, Social Justice, Communication, Empathy, Social Impact, Liberal Arts, Social Sciences, Cultural Diversity, Creativity, Research, Psychology, Ethical Standards And Conduct, Neurology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Generative AI, Cloud Security, Cloud Infrastructure, Cybersecurity, Cloud Platforms, Cloud Computing, Data Storage, Peripheral Devices, Computer Hardware, Cyber Attacks, System Configuration, Artificial Intelligence, Cloud Storage, OSI Models, General Networking, Data Security, Test Planning
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Virtual Networking, Security Controls, Cloud Computing, Threat Management, Application Security, Data Security
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Embedded Software, Embedded Systems, Electronics Engineering, Electronic Systems, Electronic Hardware, Electronics, Machine Controls, Control Systems, Electrical Systems, Hardware Design, Programmable Logic Controllers, Equipment Design, Electronic Components
Build toward a degree
Intermediate · Course · 1 - 3 Months

West Virginia University
Skills you'll gain: Recruitment, Sales Training, Sales Management, Talent Recruitment, Sales, Employee Training, Performance Appraisal, Team Motivation, Interviewing Skills, Job Analysis, Performance Measurement
Mixed · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks