
Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Business Continuity Planning, Risk Mitigation, Risk Management, Risk Analysis, Threat Management, IT Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), Disaster Recovery, Governance Risk Management and Compliance, Risk Control, Operational Risk, Cybersecurity, Incident Response, Emerging Technologies, Compliance Management
Intermediate · Course · 1 - 4 Weeks
University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Empathy, Data Storytelling, Interactive Data Visualization, Risk Analysis, Data-Driven Decision-Making, Data Analysis, Risk Management, Stakeholder Analysis, Analytical Skills, Human Centered Design, Decision Making, User Research, Risk Control, Psychology
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Network Analysis, Social Network Analysis, Marketing Analytics, Data Science, Unstructured Data, Text Mining, Data Structures, Data Visualization, Natural Language Processing, Scientific Visualization, Python Programming, Data Manipulation
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Risk Control, Risk Management, Compliance Reporting, Risk Mitigation, Risk Analysis, Business Risk Management, Internal Controls, Continuous Monitoring, Data Management, Key Performance Indicators (KPIs), Stakeholder Communications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Firewall, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
Intermediate · Specialization · 1 - 3 Months