
Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Encryption, Data Security, Network Security, Information Systems Security, Web Components, Public Key Infrastructure, Wireless Networks
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Virtual Machines, Virtualization, Firewall, Intrusion Detection and Prevention, Security Awareness, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Secure Coding, Security Testing, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Web Applications, Browser Compatibility, Computer Programming
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: ASP.NET, Application Deployment, User Accounts, Authorization (Computing), Role-Based Access Control (RBAC), Microsoft Azure, OAuth, Identity and Access Management, Bootstrap (Front-End Framework), Database Management, Authentications, Email Automation
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months
Skills you'll gain: AI Security, Threat Modeling, MITRE ATT&CK Framework, Security Controls, Responsible AI, MLOps (Machine Learning Operations), Security Testing, Secure Coding, Cybersecurity, Model Deployment, Data Security, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Application Lifecycle Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Test Planning
Advanced · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Cyber Attacks, Continuous Monitoring, Enterprise Security, Security Awareness, Cyber Operations, Information Technology Operations, Automation, Systems Integration
Beginner · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months