
Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Risk, Vendor Relationship Management, Security Controls, Cost Management, Thought Leadership, Cyber Security Strategy, Initiative and Leadership, Supplier Risk Management, Risk Management, Performance Metric, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, Cloud Services, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, Cloud Applications, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cyber Attacks, Email Security, Cybersecurity, Malware Protection, Human Factors (Security), Encryption, Threat Detection, Multi-Factor Authentication, Internet Of Things, Information Privacy, Security Software, Network Security, Personally Identifiable Information, Authentications, Data Security, Security Controls, Mobile Security, Identity and Access Management
Beginner · Course · 3 - 6 Months
Microsoft
Skills you'll gain: Prompt Engineering, Prompt Engineering Tools, Prompt Patterns, Microsoft Copilot, AI Integrations, AI Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Threat Detection, Generative AI
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Event Monitoring, Exploit development, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Security Architecture Review, Patch Management, Code Review, Incident Management, Application Deployment, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Endpoint Detection and Response, Threat Detection, Incident Response, Cloud Security, Cyber Threat Intelligence, Computer Security Incident Management, Microsoft Azure, Security Information and Event Management (SIEM), Endpoint Security, Azure Active Directory, Incident Management, Security Controls, Multi-Cloud, Anomaly Detection, Email Security, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Automation, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Security Software, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Cloud Services, Cloud Computing, Identity and Access Management, Enterprise Security, Data Governance, Infrastructure Security, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
Mixed · Course · 1 - 4 Weeks