University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Data Integrity, Encryption, FinTech, Network Security, Transaction Processing, Emerging Technologies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Troubleshooting, Computer Networking, Network Protocols, Web Applications, Computer Security Awareness Training, Network Routers, Wireless Networks, Technical Support and Services, Encryption, Security Awareness, Computer Literacy, System Configuration, Microsoft Office, Authentications, Microsoft Windows, Peripheral Devices, Patch Management, Technical Support, Mac OS, Database Management
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Infrastructure, Identity and Access Management, Google Cloud Platform, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Kubernetes, Authentications, Cloud Security, Cloud Applications, Prompt Engineering, Cloud Computing, Encryption, Security Controls, OAuth, Cloud Storage, Virtual Machines, Network Infrastructure, Containerization, Threat Management, Data Security
Intermediate · Specialization · 3 - 6 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Azure Synapse Analytics, Data Security, Databricks, Data Quality, Microsoft Azure, Data Storage Technologies, Data Storage, Data Transformation, Database Management, Data Processing, Data Cleansing, Data Lakes, Query Languages, Performance Tuning, Data Integration, Data Pipelines, Apache Spark, Encryption, Data Analysis, Real Time Data
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Operations, Threat Management, Threat Detection, Cybersecurity, Scripting, Python Programming, Encryption, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Network Security, Cloud Applications, Authorization (Computing), Role-Based Access Control (RBAC), Application Security, Microsoft SQL Servers, Web Applications, Database Application, Cloud Development, Azure Active Directory, Firewall, Relational Databases, Cloud Management, Key Management, Threat Detection, Authentications, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Hardening, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Information Assurance, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Encryption, Security Awareness, Human Factors (Security), Risk Analysis, Problem Solving, Communication
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months