
Skills you'll gain: Digital Forensics, Cybersecurity, Malware Protection, Network Security, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Web Applications
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: File Systems, Digital Forensics, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, Data Storage
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery
Intermediate · Specialization · 1 - 3 Months

Starweaver
Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Technical Communication, Incident Response, Writing, Technical Documentation, Data Analysis Software, File Systems, Artifactory, Microsoft Windows
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Digital Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Business Software, Computer Hardware, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Enterprise Security, System Software, Information Technology, Hardware Troubleshooting, Computer Architecture, Technology Solutions, System Configuration, Technical Support and Services, Servers, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Investigation, Fraud detection, Auditing, Litigation Support, Accounting, Report Writing, Due Diligence, Employee Training, Internal Controls, Risk Analysis, International Finance, Compliance Training, Analytical Skills
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Virtualization, Computer Architecture, Excel Macros, Linux
Intermediate · Course · 1 - 3 Months