
Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Cyber Attacks, Network Architecture, Cloud Computing, Threat Management, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Cloud Deployment, Application Security, Infrastructure Security
Intermediate · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Computer Security Awareness Training, Personally Identifiable Information, Cyber Risk, Incident Management, Threat Detection, Information Privacy, Network Security, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Application Security, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks
Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Architecture Review, Security Testing, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring
Mixed · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cyber Attacks, Cybersecurity, Security Requirements Analysis, Security Testing, Threat Modeling, Vulnerability Assessments, Software Design, Encryption, Vulnerability Management, Security Controls, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring
Intermediate · Course · 1 - 3 Months

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Information Systems Security, Human Factors (Security), Computer Security, Network Security, Cybersecurity, Security Awareness, Vulnerability, Threat Modeling, Policy Analysis, Political Sciences, Security Controls, Vulnerability Assessments, Public Policies, Safety and Security, Human Factors, Cryptography, Usability, Software Testing
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Information Systems Security, Wireless Networks, General Networking, Network Security, Cybersecurity, IBM Cloud, Computing Platforms, Cloud Platforms, Cryptography, Telecommunications, Network Protocols, Market Opportunities, Automation, Emerging Technologies, Embedded Systems, Software-Defined Networking, Market Analysis, Market Share
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Cybersecurity, Computer Security, Information Assurance, Authentications, Data Security, Theoretical Computer Science, Public Key Cryptography Standards (PKCS), Threat Modeling, Communication Systems, Algorithms, Digital Communications
Intermediate · Specialization · 3 - 6 Months

Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Patient Safety, Malware Protection, Security Controls, Encryption, Health Technology, Data Security, Information Privacy
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Threat Management, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Exploitation techniques, Network Security, Vulnerability Assessments, Cloud Services, Cloud Computing, Vulnerability Management, Data Security, Human Factors (Security), Incident Response, Software As A Service
Beginner · Course · 1 - 3 Months