
University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, Financial Inclusion, FinTech, Mobile Banking, Emerging Technologies, Point of Sale, Transaction Processing, Security Controls, Innovation, Digital Assets, Value Propositions
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Security, Vulnerability Management, Secure Coding, Hardening, Security Controls, Cybersecurity, Authorization (Computing), Cryptography, System Configuration, Encryption
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Application Security, Threat Detection, Information Systems Security, Network Security, Computer Security, Encryption
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, AI Security, Endpoint Security, Threat Modeling, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Network Protocols, OSI Models, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Generative AI, Cloud Security, Cloud Infrastructure, Cybersecurity, Cloud Platforms, Cloud Computing, Data Storage, Peripheral Devices, Computer Hardware, Cyber Attacks, System Configuration, Artificial Intelligence, Cloud Storage, OSI Models, General Networking, Data Security, Test Planning
Beginner · Specialization · 3 - 6 Months

Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Deployment, Responsible AI, Cloud Security, Data Literacy, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Cloud Storage, Generative AI, Infrastructure As A Service (IaaS), Big Data, Data Analysis, Data Science, Natural Language Processing, Robotics, Business Logic, Business
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Application Security, Incident Response, Intrusion Detection and Prevention, Network Security, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Data Security, Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Vulnerability Assessments, Multi-Factor Authentication, System Configuration, Scripting, Linux Commands, Bash (Scripting Language), Linux, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months