
Skills you'll gain: Identity and Access Management, Computer Security Incident Management, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Information Systems Security, Network Architecture, Computer Networking, DevSecOps, Risk Management, OAuth, Data Management, Software Development Methodologies, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Data Encryption Standard, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Programming Principles, Computational Thinking, IBM Cloud, Linear Algebra, Arithmetic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Data Encryption Standard, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, FinTech, Data Sharing, Transaction Processing, Fraud detection, Distributed Computing, Payment Systems, Data Integrity, Emerging Technologies, Digital Assets, Authentications, Software Systems, Systems Architecture, Data Security, Computer Systems, Software Architecture, Network Security, Network Analysis
Beginner · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Hardware Architecture, Threat Modeling, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Theoretical Computer Science, Applied Mathematics, Algorithms, Cryptography, Relational Databases, Data Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Brute-force attacks, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Cryptographic Protocols, Threat Management, Security Engineering, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Vulnerability Management, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Scripting, Regulatory Compliance, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months