
Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Application Security, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Cyber Security Assessment, Brute-force attacks, Python Programming, Programming Principles, Scripting, Algorithms, Data Structures, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Brute-force attacks, Scripting, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Systems Analysis, Automation
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Event Monitoring, Continuous Monitoring, Security Information and Event Management (SIEM), Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Encryption, Amazon Web Services, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months