
Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, Linux Servers, System Monitoring, File Systems, System Support, File Management, Windows Servers, Data Security
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Software Testing, DevSecOps, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Database Application, Software Architecture, Agile Methodology
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: SonarQube, Code Review, Vulnerability, CI/CD, Secure Coding, GitLab, Jenkins, Application Security, Vulnerability Assessments, Software Quality Assurance, Maintainability, Kubernetes, GitHub, Software Installation, Security Management, Data Integration, Performance Tuning, Quality Improvement, Technical Management, Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, LLM Application, Cyber Security Assessment, Large Language Modeling, Continuous Monitoring, Security Testing, Responsible AI, Threat Modeling, Vulnerability Assessments, Prompt Engineering, Security Controls, Penetration Testing, Vulnerability Scanning, Security Strategy, AI Personalization, Scenario Testing, System Implementation
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, White-Box Testing, Secure Coding, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Salesforce, Salesforce Development, Workflow Management, Operational Efficiency, Data Access, Business Process Automation, Data Security, Data Sharing, Application Security, Role-Based Access Control (RBAC), IT Automation, Automation, Security Management, Customer Relationship Management (CRM) Software
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months