
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Secure Coding, Security Testing, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Web Applications, Browser Compatibility, Computer Programming
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Threat Modeling, MITRE ATT&CK Framework, Security Controls, Responsible AI, MLOps (Machine Learning Operations), Secure Coding, Security Testing, Cybersecurity, Model Deployment, Data Security, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Application Lifecycle Management
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Testing, Threat Modeling, Data Security, Security Controls, Cyber Security Assessment, Cybersecurity, Security Awareness, Threat Management, Continuous Monitoring, Authorization (Computing), Encryption, Penetration Testing, Data Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: User Experience Design, Usability, User Experience, User Interface and User Experience (UI/UX) Design, Threat Modeling, UI/UX Strategy, Interaction Design, Application Security, Authentications, Human Centered Design, Security Strategy, Usability Testing, Authorization (Computing), Security Controls, Multi-Factor Authentication, Security Awareness, Computer Security Awareness Training, Cybersecurity, Safety Standards, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Systems Integration, Enterprise Architecture, Data Governance, Cloud Deployment, Security Strategy, Cloud Management, Enterprise Security, Security Management, Security Controls, Problem Management, Threat Modeling, Continuous Monitoring
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Cloud Security, Data Governance, Data Management, Data Security, Secure Coding, Cloud Applications, Application Security, Identity and Access Management, Key Management, Multi-Factor Authentication, Encryption, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Cloud Computing Architecture, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, Network Architecture, Cybersecurity, Computer Networking, Network Security, Threat Detection, Network Routers, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks