
Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, Test Automation, Secure Coding, Code Review, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Vulnerability Management, Cyber Governance, Threat Modeling, Network Security, Cyber Threat Intelligence, Malware Protection, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Hardening, Threat Detection, Security Strategy, Application Security, Mobile Security, Business Risk Management, Cyber Security Policies, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning
Beginner · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Computing Architecture, Identity and Access Management, Cloud Infrastructure, AWS Identity and Access Management (IAM), Virtual Machines, Cloud Security, Virtualization, Cloud Computing, Cloud Deployment, Cloud Platforms, Authorization (Computing), Cloud Services, Role-Based Access Control (RBAC), User Provisioning, Threat Management, Authentications, Multi-Factor Authentication, Threat Detection, Scalability, Continuous Monitoring
Beginner · Course · 1 - 4 Weeks

Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Endpoint Security, Network Security, Cyber Attacks, Encryption, Information Systems Security, Application Security, Cyber Security Policies, Penetration Testing, Data Security, Computer Security Awareness Training, Firewall, Cryptography, Security Controls, Threat Modeling, Intrusion Detection and Prevention, Security Awareness, Mobile Security, Malware Protection, Authentications
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Apache, Web Servers, Authentications, Application Servers, Server Side, Secure Coding, Web Applications, Application Security, Restful API, Servers, Back-End Web Development, Javascript
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Cyber Security Policies, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Security Awareness, Firewall, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Secure Coding, Firewall, Application Security, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Security Requirements Analysis, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months