Skills you'll gain: Mobile Security, AI Security, Threat Detection, Security Controls, Exploit development, Threat Modeling, Hardening, Threat Management, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Deep Learning, Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Knowledge Accelerators
Skills you'll gain: Cyber Security Policies, AI Security, Cybersecurity, Cyber Attacks, Cyber Risk, Email Security, Mobile Security, Safety and Security, Identity and Access Management, Remote Access Systems, Multi-Factor Authentication, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, AI Security, Cyber Operations, Threat Modeling, Zero Trust Network Access
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Network Protocols
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks