Skills you'll gain: Application Security, OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Server Side, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: AI Security, Responsible AI, Data Ethics, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Internet Of Things, Wireless Networks, General Networking, Cybersecurity, IBM Cloud, Cloud Platforms, Cryptography, Automation, Emerging Technologies, Software-Defined Networking, Market Analysis
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AI Security, Responsible AI, Large Language Modeling, IT Security Architecture, Threat Modeling, Vulnerability Assessments, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Security Controls, Cloud Computing, Virtual Networking, Firewall, Network Security, Data Access, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Authentications, Public Cloud, Load Balancing
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Risk Mitigation, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Security Policies, Governance, Data Governance, Security Controls, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks