
Infosec
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), AI Security, Responsible AI, API Testing, Penetration Testing, OpenAI, OpenAI API, Exploitation techniques, Vulnerability Scanning, Generative AI, Large Language Modeling
Beginner · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Public Key Infrastructure, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Information Systems Security, Malware Protection, Authentications, Cyber Attacks, Threat Detection, Data Integrity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, DevSecOps, Cloud Security, Exploitation techniques, Vulnerability Scanning, Security Testing, Application Security, Incident Response, Security Engineering, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, AI Security, Threat Management, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Cyber Attacks, Network Security
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Threat Detection, Workflow Management, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Computer Security Incident Management, Cyber Attacks, Infrastructure Security, Event Monitoring, Data Security, Performance Measurement, Automation
Mixed · Course · 1 - 3 Months

ISC2
Skills you'll gain: Configuration Management, Cybersecurity, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Security Strategy, System Monitoring, General Networking, Cryptography, Data Management
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: AI Security, Responsible AI, Cyber Security Strategy, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Risk Management Framework, Cyber Security Strategy, Cyber Threat Intelligence, Threat Modeling, Security Strategy, Security Awareness, Cybersecurity, Security Engineering, IT Security Architecture, Zero Trust Network Access, Threat Management, Human Factors (Security), Security Controls, Threat Detection, Network Security, Information Systems Security, Incident Response, Enterprise Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months