
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Encryption, OSI Models, Network Architecture, Computer Networking, Remote Access Systems, TCP/IP, Network Infrastructure, Network Protocols, Wireless Networks, Virtual Private Networks (VPN), Virtual Networking, Endpoint Security, Cloud Security, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Rust (Programming Language), Command-Line Interface, Encryption, Package and Software Management, Application Development, Cryptography, Software Engineering, Algorithms
Beginner · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, Transaction Processing, Authentications, FinTech, Data Security, Emerging Technologies, Data Integrity, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Data Security, Cybersecurity, Cyber Attacks, Web Applications, Threat Detection, Security Awareness, Vulnerability Management, Encryption, Authentications, Authorization (Computing), PHP (Scripting Language)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Data Security, Key Management, Encryption, Data Integrity, Authentications, Authorization (Computing), Transaction Processing, Algorithms
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months