
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Brute-force attacks, Scripting, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Systems Analysis, Automation
Beginner · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Authentications, Cryptography, Secure Coding, Kotlin, Android (Operating System), OAuth, Encryption, Mobile Security, Android Development, Key Management, Exploit development, Application Security, Android Studio, Data Security, Open Web Application Security Project (OWASP), Authorization (Computing), Mobile Development, Security Engineering, Security Controls, Application Development
Intermediate · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Endpoint Detection and Response, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Data Persistence, Scripting, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Incident Response, LLM Application, Hardening, Anomaly Detection, Responsible AI, Security Controls, Application Security, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Process Optimization, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Intrusion Detection and Prevention, Criminal Investigation and Forensics, Cyber Security Strategy, Investigation, Cyber Threat Intelligence, Cyber Attacks, File Systems, Mobile Development, Cybersecurity, Threat Modeling, Cyber Security Policies, Apple iOS, Data Security, Android (Operating System), Artificial Intelligence and Machine Learning (AI/ML), Application Security, Data Integrity, Legal Proceedings
Intermediate · Specialization · 3 - 6 Months