
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Computer Security Incident Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Policies, Networking Hardware, Threat Detection, Technical Support, Network Security, General Networking, Computer Networking, Network Architecture, Network Administration, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Security Management, Network Security, Cyber Security Policies, Internet Of Things, Data Security, Wireless Networks, Emerging Technologies, Business Logic
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Proxy Servers, Google Cloud Platform, Firewall, Infrastructure Security, Network Monitoring, Intrusion Detection and Prevention, Threat Detection, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Virtual Networking, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Google Cloud Platform, Firewall, Cloud Security, Network Troubleshooting, Infrastructure Security, Identity and Access Management, Threat Detection, Cloud Infrastructure
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Amazon CloudWatch, Network Troubleshooting, Continuous Monitoring, Identity and Access Management, AWS Identity and Access Management (IAM), Encryption, Network Security, System Monitoring, Network Administration, Amazon Web Services, Security Controls, Cloud Security, Firewall, Network Monitoring, Network Performance Management, Governance
Intermediate · Course · 1 - 4 Weeks