
LearnKartS
Skills you'll gain: Security Awareness, Information Systems Security, Cybersecurity, Data Sharing, Cyber Security Policies, Information Privacy, Security Controls, Authentications, Professional Development
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, digital literacy, Network Security, Computer Hardware, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Data Ethics, Cybersecurity, General Networking, Productivity, Safety and Security, Process Design
Beginner · Specialization · 1 - 3 Months

Whizlabs
Skills you'll gain: Security Strategy, Data Governance, Governance, AI Security, Cyber Security Strategy, Risk Appetite, Security Controls, Compliance Management, Risk Management, Risk Analysis, Vendor Management, Business Continuity, Performance Metric, Business Priorities, Feasibility Studies, Disaster Recovery, Budget Management
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Security Requirements Analysis, Application Security, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Audit Planning, Enterprise Architecture, Compliance Management, Regulatory Compliance, Quality Assurance, Enterprise Risk Management (ERM), Quality Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Hardening, Incident Response, Vulnerability Assessments, Security Strategy, Security Controls, Computer Security Incident Management, Infrastructure Security, Security Testing, Control Systems, Information Systems Security, Continuous Monitoring, Penetration Testing, Cyber Security Strategy, Cyber Attacks, Risk Analysis, Operational Risk, Data Security, Risk Management Framework, Risk Management, Operational Databases
Intermediate · Course · 1 - 4 Weeks