
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols
Build toward a degree
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, IT Management, System Monitoring, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Unix, Procedure Development, Incident Response
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Computer Security Incident Management, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Infrastructure Security, Security Strategy, Data Security, Systems Architecture, Threat Detection, Cyber Governance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Business Continuity Planning, Disaster Recovery, Business Continuity, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Security Awareness, Risk Analysis, Compliance Management, Business Analysis, Digital Forensics
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Information Management, Business Ethics, Performance Measurement, Compliance Management, Governance, Business Planning, Organizational Strategy
Beginner · Course · 1 - 3 Months

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Test Planning
Advanced · Course · 1 - 3 Months

Skills you'll gain: OAuth, Cloud Security, Authorization (Computing), Identity and Access Management, Google Cloud Platform, Proxy Servers
Intermediate · Project · Less Than 2 Hours