Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Threat Detection, Security Controls, Security Testing, Application Development, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months
Johns Hopkins University
Skills you'll gain: Data Quality, Exploratory Data Analysis, Employee Onboarding, Data Management, Statistical Reporting, Team Motivation, Technical Communication, Data Analysis, Data Presentation, Project Management, Interviewing Skills, Data Science, Data-Driven Decision-Making, Data Strategy, Organizational Leadership, Team Management, Workflow Management, Analytical Skills, Leadership, Communication
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Serverless Computing, Security Strategy, Network Security, Firewall, Cloud Management, Cyber Security Strategy, Infrastructure As A Service (IaaS), Distributed Denial-Of-Service (DDoS) Attacks, System Monitoring, Cloud Security, Application Security, Internet Of Things, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Security Requirements Analysis, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Google Cloud Platform, Cost Management, Cloud Management, System Monitoring, Application Performance Management, Cloud Security, Identity and Access Management, Key Management, Cloud Deployment, Infrastructure as Code (IaC), Continuous Monitoring, Encryption, Event-Driven Programming, Real Time Data
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months