
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: AI Security, Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Threat Modeling, Cyber Security Assessment, Risk Analysis, Application Security, Vulnerability Assessments, Network Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), AI Security, Threat Modeling, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Real Time Data, Artificial Intelligence and Machine Learning (AI/ML), AI Workflows, Anomaly Detection, AI Personalization, Vulnerability Management, Artificial Intelligence, Incident Management
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Cloud Security, Operating Systems, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN), Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Root Cause Analysis, Data Security, Problem Management, Site Reliability Engineering, Capacity Management, Resource Management, Identity and Access Management, Role-Based Access Control (RBAC), Compliance Auditing, Configuration Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardening, Incident Response, Vulnerability Assessments, Security Strategy, Security Controls, Computer Security Incident Management, Infrastructure Security, Security Testing, Control Systems, Information Systems Security, Continuous Monitoring, Penetration Testing, Cyber Security Strategy, Cyber Attacks, Risk Analysis, Operational Risk, Data Security, Risk Management Framework, Risk Management, Operational Databases
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Lightweight Directory Access Protocols, Active Directory, Windows PowerShell, Open Web Application Security Project (OWASP), Exploitation techniques, Security Testing, API Testing, Vulnerability Scanning, Cloud Security, Windows Servers, Cyber Security Assessment, Azure Active Directory, IT Automation, Scripting, Application Programming Interface (API), Microsoft Azure, Vulnerability Assessments, MySQL Workbench, Cloud Computing
Intermediate · Course · 3 - 6 Months