
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Requirements Documents, Technology Strategies, Technology Solutions, Requirements Analysis, Product Requirements, Agile Product Development, Agile Methodology, Business Requirements, Decision Making, Cross-Functional Team Leadership, Request for Proposal, Vendor Management, Team Management, Vendor Relationship Management, Proposal Development, Product Demonstration, Return On Investment, Leadership, Procurement
Intermediate · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, OSI Models, Network Routing, Network Infrastructure, Software-Defined Networking, Local Area Networks, Virtualization
Mixed · Course · 1 - 3 Months

Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Identity and Access Management, Security Controls, System Configuration, Network Monitoring, Enterprise Security
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Security Management, Cyber Governance, IT Management, Cybersecurity, Cyber Security Strategy, Cyber Risk, Cyber Security Policies, Key Performance Indicators (KPIs), Leadership and Management, Technical Communication, Internal Communications, Leadership, Program Management, Risk Management, Communication, Stakeholder Communications
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Amazon Web Services
Skills you'll gain: Amazon Bedrock, Responsible AI, Generative AI, AI Security, Artificial Intelligence, Large Language Modeling, Amazon Web Services, Embeddings, Retrieval-Augmented Generation, Image Analysis
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric
Mixed · Course · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: OSI Models, Network Security, TCP/IP, Network Architecture, Network Protocols, General Networking, Network Routers, Routing Protocols, Public Key Infrastructure, Network Model, Cryptography, Web Applications
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Network Security, Computer Hardware, Computer Systems, TCP/IP, Information Technology, General Networking, Computer Literacy, Network Protocols, Operating Systems, Computer Networking, Software Systems, File Systems
Beginner · Course · 1 - 4 Weeks

ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, FinTech, Emerging Technologies, Ledgers (Accounting), Business Modeling, Internet Of Things, Distributed Computing, Open Source Technology, Digital Assets, Transaction Processing, Scalability
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Hardening, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption
Intermediate · Course · 1 - 3 Months