
Skills you'll gain: Threat Modeling, Network Security, Threat Management, Vulnerability Management, Intrusion Detection and Prevention, Hardening, Computer Security Incident Management, Security Management, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cybersecurity, Network Protocols, Threat Detection, Bash (Scripting Language), Debugging, Linux, Interviewing Skills, Python Programming, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

LearnKartS
Skills you'll gain: Computer Security Incident Management, Vulnerability Management, Cyber Security Strategy, Cyber Governance, Incident Response, Cyber Threat Intelligence, Encryption, Cyber Attacks, Governance Risk Management and Compliance, Threat Detection, Security Strategy, Mobile Security, Business Risk Management, Cyber Security Policies, Cyber Security Assessment, Compliance Management, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Multi-Factor Authentication, Information Architecture, Security Controls, Software Documentation, Authentications, ISO/IEC 27001, Penetration Testing, Vulnerability Assessments, Cross-Functional Collaboration, Application Security, Web Content Accessibility Guidelines, Auditing, Security Information and Event Management (SIEM), Technical Documentation, Enterprise Security, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Maintainability, End User Training and Support, User Accounts
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Digital Forensics, Cyber Threat Hunting, Incident Response, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Networking Hardware, Network Security, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Cybersecurity, Security Awareness, Encryption, Cryptography, Security Management, Authorization (Computing), Firewall, Authentications, Threat Detection, Hardening, Malware Protection, AI Enablement, Wireless Networks
Beginner · Course · 1 - 3 Months
Skills you'll gain: Web Content Accessibility Guidelines, Compliance Auditing, Compliance Management, Regulatory Compliance, Case Studies, Usability, Web Design, User Interface (UI), Auditing, Web Development Tools, Automation, Consulting, Test Tools, Gap Analysis, Stakeholder Communications, Prioritization
Intermediate · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Disabilities, Web Content Accessibility Guidelines, Education and Training, Adaptive Equipment, Hypertext Markup Language (HTML), Instructional Design, Visual Impairment Education, Law, Regulation, and Compliance, Microsoft Office, Advocacy
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security
Beginner · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Security Engineering, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months