LearnQuest
Skills you'll gain: Blockchain, Key Management, Security Controls, Cryptography, Cybersecurity, Security Engineering, Application Security, Network Security, Vulnerability Assessments, Encryption, Secure Coding, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Transaction Processing, Risk Management, Code Review, Data Integrity
Intermediate · Specialization · 3 - 6 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Blockchain, Cryptography, FinTech, Governance, Emerging Technologies, Payment Systems, Transaction Processing, Distributed Computing, Digital Assets, Cyber Governance, Regulation and Legal Compliance, Ledgers (Accounting), Data Security, Interoperability, Case Studies, Scalability
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months
University of California, Irvine
Skills you'll gain: Blockchain, Data Sharing, Cryptography, Transaction Processing, Fraud detection, Distributed Computing, FinTech, Systems Architecture, Emerging Technologies, Software Versioning, Data Validation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Duke University
Skills you'll gain: Data Pipelines, Rust (Programming Language), Restful API, Amazon Web Services, Cloud API, Data Structures, Data Processing, Application Programming Interface (API), Cloud Applications, Real Time Data, Data Manipulation, System Programming, Cryptography, Encryption, Python Programming, Command-Line Interface, Software Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Object Oriented Programming (OOP), File I/O, Encryption, Data Structures, Software Development, Data Visualization, Model Evaluation, Automation, Machine Learning Algorithms, Classification Algorithms, Data Preprocessing, Databases, Public Key Cryptography Standards (PKCS), Python Programming, Natural Language Processing, Algorithms, Key Management, Software Installation, Data Validation
Beginner · Specialization · 3 - 6 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Modeling, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Data Security, Identity and Access Management, Infrastructure Security, Hardening
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Hardening, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption
Intermediate · Course · 1 - 3 Months