
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Operating System Administration, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Threat Management, General Networking, Windows PowerShell, Cyber Governance, Unix Commands
Beginner · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, NIST 800-53, Digital Forensics, Security Controls, Disaster Recovery, Authorization (Computing), Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Change Control, Cybersecurity, Threat Management, Risk Management, System Monitoring, Security Strategy, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Vulnerability Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks