
University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Encryption, Network Security, Cybersecurity, Authentications, Public Key Cryptography Standards (PKCS), Vulnerability Assessments, Data Validation, Data Integrity, Transaction Processing, Distributed Computing
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Load Balancing, Google Cloud Platform, Cloud Storage, Cloud Services, Cloud Computing, Web Servers
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems, Authentications
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Risk, Cyber Security Strategy, Cyber Attacks, Security Management, Cyber Governance, Security Awareness, Cyber Security Policies, Cyber Threat Intelligence, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Operations, Cyber Security Assessment, Crisis Management, Threat Management
Beginner · Specialization · 3 - 6 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Simplilearn
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Operational Risk, Application Security, Security Requirements Analysis, DevSecOps, Security Testing, Threat Modeling, Cyber Attacks, Web Development, Web Applications, Security Management, Vulnerability Assessments, Security Software, Security Engineering, Security Controls, Scenario Testing, Authorization (Computing), Software Development, Data Manipulation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: User Provisioning, User Accounts, Mobile Security, Cloud Computing, Security Controls, Identity and Access Management, Cloud Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), System Configuration, Multi-Factor Authentication, Data Loss Prevention
Beginner · Course · 1 - 3 Months

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks