
Skills you'll gain: Cryptography, Encryption, Cryptographic Protocols, Secure Coding, Public Key Cryptography Standards (PKCS), Key Management, Public Key Infrastructure, Python Programming, Brute-force attacks, Scripting, Algorithms
Mixed · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
Intermediate · Course · 1 - 4 Weeks

The State University of New York
Skills you'll gain: Blockchain, Market Liquidity, FinTech, Financial Market, Cryptographic Protocols, Financial Systems, Governance, Financial Trading, Financial Services, Network Protocols, Digital Assets
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Cyber Attacks, Encryption, IT Security Architecture, Identity and Access Management, Threat Management, Threat Detection, Firewall, Key Management, Security Management, Infrastructure Security, Security Controls, Network Planning And Design, Authorization (Computing), Public Key Infrastructure, Authentications, Risk Management Framework
Beginner · Course · 1 - 3 Months

Pearson
Skills you'll gain: Network Security, Network Administration, Virtual Private Networks (VPN), Cyber Security Policies, Security Controls, Infrastructure Security, Cybersecurity, Security Management, Identity and Access Management, Authentications, Dynamic Host Configuration Protocol (DHCP), Security Awareness, Remote Access Systems, Authorization (Computing), Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Security Testing, Network Security, Data Security, Threat Detection, Cryptography, Infrastructure Security, Security Software, Transaction Processing, Malware Protection, Key Management, Scripting, Network Protocols, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Cryptographic Protocols, Vulnerability Management, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Public Key Infrastructure, Cyber Security Assessment, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Rust (Programming Language), Command-Line Interface, Build Tools, Encryption, Package and Software Management, Application Development, Cryptography, Software Engineering
Beginner · Guided Project · Less Than 2 Hours

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Network Security, Information Systems Security, Cybersecurity, Public Key Cryptography Standards (PKCS), Vulnerability Assessments, Data Validation, Vulnerability Management, Data Integrity, Transaction Processing, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Event Monitoring, Exploit development, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Security Architecture Review, Patch Management, Code Review, Incident Management, Application Deployment, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks