
University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Brute-force attacks, Algorithms
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Operating System Administration, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Threat Management, General Networking, Windows PowerShell, Cyber Governance, Unix Commands
Beginner · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Threat Modeling, Vulnerability Assessments, Cybersecurity, Enterprise Security, Network Security, Regulation and Legal Compliance, Data Security, Secure Coding, Key Management, Application Frameworks, Distributed Denial-Of-Service (DDoS) Attacks, Emerging Technologies, Data Integrity
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, DevOps, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Brute-force attacks, Encryption, Information Systems Security, Cybersecurity, Theoretical Computer Science, Computational Logic
Intermediate · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Network Security, Encryption, Advanced Encryption Standard (AES), Cybersecurity, Key Management, Security Engineering, Data Integrity, Federated Learning, Security Management
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Medical Privacy, Information Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Data Governance, Security Management, Computer Security Incident Management, Personally Identifiable Information, Law, Regulation, and Compliance, Data Security, Governance, Information Assurance, Document Management, Security Controls, Threat Management, Health Information Management, General Data Protection Regulation (GDPR), Compliance Management, Regulatory Compliance, Training Programs, Compliance Training
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks