
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Endpoint Security, Identity and Access Management, Information Privacy, Cryptography, Data Loss Prevention, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Security Assessment, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Threat Management, Cyber Risk, Social Media
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
Beginner · Specialization · 1 - 4 Weeks

Knowledge Accelerators
Skills you'll gain: Cyber Security Policies, AI Security, Cybersecurity, Threat Management, Cyber Attacks, Cyber Risk, Email Security, Endpoint Security, Mobile Security, Remote Access Systems, Multi-Factor Authentication, Artificial Intelligence, Cloud Computing
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Incident Response, Cyber Governance, Incident Management, Computer Security Incident Management, Safety Culture, Cyber Risk, Security Awareness, Event Monitoring, Cyber Security Strategy, Cyber Attacks, Dashboard, Threat Management, Security Management, Cyber Security Policies, Cyber Threat Intelligence, Mobile Security, Corporate Communications, Cybersecurity, Cyber Security Assessment, Cyber Operations
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux, Linux Commands, Linux Administration, Cloud Computing Architecture, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Virtual Machines, Firewall, Virtualization, Knowledge of Apple Software, File Management, User Accounts
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Incident Management, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Application Security, Cyber Risk, Information Systems Security, Risk Management
Intermediate · Specialization · 1 - 3 Months