
Multiple educators
Skills you'll gain: Incident Response, Digital Forensics, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Penetration Testing, Cloud Services, Business Continuity, Cloud Deployment, Disaster Recovery, Security Controls, Generative AI, Configuration Management, Governance, Cybersecurity, Data Storage, Peripheral Devices, Application Security, Information Technology, Cryptography
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, IT Automation, Algorithms, Automation, Computer Programming, File Management, Data Structures
Beginner · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Internet Of Things, Networking Hardware, Network Infrastructure, Network Routers, General Networking, Network Switches, Network Protocols, Network Architecture, Cloud Infrastructure, Wireless Networks, Network Administration, Local Area Networks, Wide Area Networks, Infrastructure Security, Emerging Technologies, Telecommunications, Communication Systems, Distributed Computing, Python Programming, Machine Learning
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Endpoint Detection and Response, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Data Persistence, Scripting, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Algorithms, Data Structures, File I/O
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Brute-force attacks, Scripting, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Systems Analysis, Automation
Beginner · Specialization · 1 - 3 Months