
Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Engineering, Security Requirements Analysis, Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Information Privacy, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Computer Security Incident Management, Cyber Security Policies, Cyber Security Assessment, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Exploit development, Cryptography, Encryption, Exploitation techniques, Technical Design, Emerging Technologies, System Design and Implementation
Mixed · Course · 1 - 3 Months

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), System Programming, Simple Object Access Protocol (SOAP), Application Development, System Requirements, C (Programming Language), System Design and Implementation, Software Development
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Deployment, Cloud Computing Architecture, Cloud Computing, Cloud Services, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Security Controls, Secure Coding, Public Cloud, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, AI Security, Cloud Deployment, Google Cloud Platform, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Security Engineering
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months