
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Brute-force attacks, Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Information Systems Security, Cybersecurity, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Computational Logic, Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Encryption, Public Key Infrastructure, Cryptography, Data Security, Cryptographic Protocols, Advanced Encryption Standard (AES), Cybersecurity, Network Security, Blockchain, Authentications, Data Integrity, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Threat Management, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Risk Management
Intermediate · Course · 3 - 6 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Record Keeping, Cyber Security Policies, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Data Governance, Cloud Computing, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cloud Platforms, Security Controls, Threat Management
Beginner · Course · 1 - 4 Weeks