
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Network Protocols, OSI Models, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, Cloud Deployment, Software Development Life Cycle, Cloud-Native Computing, Istio, Software Architecture, Kubernetes, CI/CD, Cloud Computing Architecture, React Redux, Node.JS, Responsive Web Design, Restful API, Django (Web Framework), Git (Version Control System), HTML and CSS, Server Side, Cloud Computing, Data Import/Export, Engineering Software
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Data Analysis Software, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Software Development Life Cycle, Open Web Application Security Project (OWASP), Istio, Linux Commands, Software Architecture, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Restful API, Shell Script, Django (Web Framework), Object-Relational Mapping, Git (Version Control System), Grafana, Microservices, Data Import/Export, Python Programming
Beginner · Professional Certificate · 3 - 6 Months
Starweaver
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Cybersecurity, Strategic Leadership, Technical Communication, Cyber Risk, Strategic Communication, Stakeholder Communications, Business Leadership, Security Management, IT Management, Communication Strategies, Security Awareness, Plan Execution, Culture Transformation, Performance Metric, Business Metrics, Cross-Functional Collaboration, Employee Training
Advanced · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Power BI, Microsoft Excel, Data Analysis, Microsoft Power Platform, Data Integrity, Data Visualization, Data Storage, Data Collection, Data Quality, Data Manipulation, Business Analytics, Timelines, Advanced Analytics, Database Design, Statistical Reporting, Report Writing, Data Processing, Data Warehousing, Business Intelligence, SQL
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

LearnKartS
Skills you'll gain: Responsive Web Design, AI Personalization, Web Analytics and SEO, HTML and CSS, Web Content, Application Security, Web Servers, Cloud Hosting, Control Panels
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Software Design, Verification And Validation, Java, Code Review, Programming Principles, Debugging, Cybersecurity
Intermediate · Specialization · 3 - 6 Months