
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Disaster Recovery, Secure Coding, Database Management, Query Languages, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Vulnerability Assessments, Enterprise Security, Regulation and Legal Compliance, Data Security, Application Frameworks, Cybersecurity, Emerging Technologies, Distributed Computing, Transaction Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response
Intermediate · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
Beginner · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Network Protocols, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Information Technology, Enterprise Security, Cybersecurity, Network Administration, Computer Networking, Virtual Machines, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 3 Months
LearnQuest
Skills you'll gain: Blockchain, Key Management, Security Controls, Cryptography, Cybersecurity, Security Engineering, Application Security, Network Security, Vulnerability Assessments, Encryption, Secure Coding, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Transaction Processing, Risk Management, Code Review, Data Integrity
Intermediate · Specialization · 3 - 6 Months