
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Security Strategy, Incident Response, Human Factors (Security), End User Training and Support, Security Awareness
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Software Design, Programming Principles, Debugging, Program Development, Vulnerability Assessments, C (Programming Language), Software Development Methodologies
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Risk Mitigation, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Security Policies, Governance, Data Governance, Security Controls, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, System Monitoring, Network Protocols, Security Controls, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Network Switches, Real Time Data, Authentications, Scripting, JSON, Automation, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Firewall, Network Infrastructure, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Identity and Access Management, Authorization (Computing), Scripting, Authentications, Automation, Encryption, Data Modeling, Application Programming Interface (API)
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cloud Applications, Authentications, Google Cloud Platform, Cloud API, Web Applications, User Accounts, Web Development Tools, Web Development, Network Security
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security
Advanced · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks