
Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Data Governance, Information Privacy, Governance, Law, Regulation, and Compliance, General Data Protection Regulation (GDPR), Compliance Management, Personally Identifiable Information, Regulation and Legal Compliance, Program Development, Data Sharing, Accountability
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Anomaly Detection, Natural Language Processing, Machine Learning, Deep Learning, Supervised Learning
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Communication Systems, Network Routing, Network Architecture, Network Planning And Design, General Networking, Computer Networking, System Programming, Data Integrity
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Disaster Recovery, Digital Assets, Vulnerability Assessments, Regulatory Compliance, Enterprise Security, Data Security, Law, Regulation, and Compliance, Encryption, Cybersecurity, Network Security, Emerging Technologies, Distributed Computing, Transaction Processing
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, User Acceptance Testing (UAT), Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

EIT Digital
Skills you'll gain: Cybersecurity, Information Systems Security, Cyber Threat Intelligence, Data Ethics, Deep Learning, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks