
Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security
Advanced · Course · 1 - 3 Months

University of California, Irvine
Skills you'll gain: Core Data (Software), Apple iOS, iOS Development, JSON, Objective-C (Programming Language), OAuth, Authentications, Mobile Development, Single Sign-On (SSO), Secure Coding, Data Store, Cryptographic Protocols, Application Security, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Cloud Security, Generative AI Agents, Security Strategy, System Configuration
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Key Management, Identity and Access Management, Single Sign-On (SSO), Amazon Web Services, Encryption, Amazon CloudWatch, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Infrastructure Security, Event Monitoring, Continuous Monitoring, Security Information and Event Management (SIEM), Application Security, Security Management, Firewall, Amazon Elastic Compute Cloud, Data Security, Incident Response, Compliance Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Network Security, Virtualization, Augmented and Virtual Reality (AR/VR), Network Administration, Virtual Machines, Cloud Computing, Firewall, Virtual Private Networks (VPN), Mobile Security, Network Troubleshooting, Computer Networking, Cloud Security, Wireless Networks, Peripheral Devices
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Deployment, Google Gemini, Google Cloud Platform, AI Security, Generative AI, Cloud Security, System Configuration, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Network Administration, Network Routing, System Monitoring, Remote Access Systems, User Accounts, Authorization (Computing)
Advanced · Specialization · 1 - 3 Months