
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Computer Networking, Network Protocols, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: OSI Models, Network Security, Security Controls, General Networking, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Advanced · Project · Less Than 2 Hours

Skills you'll gain: Network Security, Encryption, OSI Models, IT Security Architecture, Network Performance Management, Network Architecture, Computer Networking, Network Monitoring, Remote Access Systems, TCP/IP, Network Infrastructure, Network Troubleshooting, Network Protocols, Infrastructure Security, Wireless Networks, Virtual Private Networks (VPN), Endpoint Security, Cloud Security, Routing Protocols, Software-Defined Networking
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Encryption, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Dynamic Host Configuration Protocol (DHCP), Routing Protocols, Network Routing, TCP/IP, Network Routers, Virtual Private Networks (VPN), OSI Models, Computer Networking, General Networking, Network Protocols, Networking Hardware, Network Switches, Network Troubleshooting, Local Area Networks, Network Performance Management, Network Infrastructure, Wireless Networks, Network Security, Network Model, Network Analysis
Beginner · Specialization · 3 - 6 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Command-Line Interface, Firewall, System Configuration, Security Management, Network Security, Network Administration, System Monitoring, Virtualization
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months