
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

CertNexus
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Mobile Security, Generative AI, Cyber Security Policies, Human Factors (Security), Computer Security, Email Security, Data Security, Safety and Security, Data Ethics, Cloud Security, Law, Regulation, and Compliance, Artificial Intelligence, Regulatory Compliance, Prompt Engineering, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Regulation and Legal Compliance, Ethical Standards And Conduct
Mixed · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Virtual Private Networks (VPN), Linux Administration, Public Key Infrastructure, Linux, Linux Servers, Intrusion Detection and Prevention, Firewall, Remote Access Systems, Operating System Administration, Authentications, Authorization (Computing), Network Security, Security Controls, Infrastructure Security, Identity and Access Management, System Monitoring, File Management, Systems Administration, Cybersecurity, Information Technology
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks
Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Testing, Security Engineering, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Image Analysis, Computer Vision, Autoencoders, Convolutional Neural Networks, Vision Transformer (ViT), Generative Adversarial Networks (GANs), Recurrent Neural Networks (RNNs), Deep Learning, Multimodal Prompts, Artificial Intelligence and Machine Learning (AI/ML), Computer Graphics, Visualization (Computer Graphics), Machine Learning Methods, Model Deployment, Embeddings, Artificial Intelligence, Data Ethics, Data Processing, Applied Machine Learning, Linear Algebra
Build toward a degree
Intermediate · Specialization · 1 - 3 Months

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Information Systems Security, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, General Networking, Cybersecurity, IBM Cloud, Cloud Platforms, Cryptography, Automation, Emerging Technologies, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Computing, Data Security, Identity and Access Management, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months