Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Risk Management Framework, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Authorization (Computing), Network Security, Threat Management, Event Monitoring, Security Strategy
★ 4.7 (67) · Beginner · Specialization · 1 - 3 Months

Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, AI Security, Cloud Deployment, Google Cloud Platform, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Vulnerability Management, Security Engineering, Threat Detection
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
★ 4.6 (18) · Intermediate · Specialization · 3 - 6 Months

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Network Security, Information Systems Security, Cybersecurity, Public Key Cryptography Standards (PKCS), Vulnerability Assessments, Data Validation, Vulnerability Management, Data Integrity, Transaction Processing, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Security Management, Cyber Governance, Continuous Monitoring, Incident Response, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Threat Management, Computer Security
★ 4.7 (631) · Beginner · Specialization · 3 - 6 Months

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Cyber Attacks, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Application Security, Computer Security Incident Management, Security Management, Cyber Security Strategy, Information Systems Security, Secure Coding, Cyber Security Policies, Cyber Security Assessment, Threat Management, Threat Detection, Information Assurance, Network Security
★ 4.7 (665) · Beginner · Course · 1 - 4 Weeks

Howard University
Skills you'll gain: Cloud Computing, Cloud Solutions, Cloud Technologies, Cloud Deployment, Cloud Security, Virtualization, Cloud Platforms, Digital Transformation, Cloud Services, Cloud Infrastructure, Virtualization and Virtual Machines, Public Cloud, Business Transformation, Infrastructure Security, Mainframe Technologies, Private Cloud, Technology Strategies, Business Solutions, Data Centers
★ 4.7 (7) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Business Continuity, Security Management, ISO/IEC 27001, Security Controls, Threat Management, Information Systems Security, Risk Management, Law, Regulation, and Compliance, Risk Analysis, Risk Management Framework, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, NIST 800-53
★ 4.8 (76) · Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
★ 4.8 (45) · Beginner · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management
★ 4.9 (30) · Beginner · Course · 1 - 3 Months