The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Threat Modeling, Security Engineering, Network Security, Threat Detection, Firewall, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Blockchain, Digital Assets, FinTech, Business Modeling, Payment Systems, Business Transformation, Transaction Processing, Identity and Access Management, Contract Management, Security Controls
Beginner · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Desktop Support, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Encryption, Identity and Access Management, Mac OS
Beginner · Course · 1 - 4 Weeks
University of Michigan
Skills you'll gain: Application Deployment, Django (Web Framework), Object-Relational Mapping, HTML and CSS, Model View Controller, jQuery, Ajax, JSON, Database Design, SQL, Application Frameworks, Databases, Web Applications, Application Development, Object Oriented Programming (OOP), Web Development, Data Modeling, Javascript, Application Security, Cascading Style Sheets (CSS)
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: OSI Models, Computer Networking, Network Routers, General Networking, TCP/IP, Network Troubleshooting, Networking Hardware, Network Switches, Local Area Networks, Network Infrastructure, Network Protocols, Network Performance Management, Network Model, Network Analysis
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux, Package and Software Management, Linux Administration, Red Hat Enterprise Linux, File Systems, User Accounts, Linux Servers, Operating System Administration, Command-Line Interface, Shell Script, System Configuration, Open Source Technology, Disaster Recovery, Linux Commands, System Monitoring, Unix Commands, Identity and Access Management, Data Storage Technologies, Systems Administration, Web Servers
Beginner · Specialization · 3 - 6 Months

University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, FinTech, Mobile Banking, Mobile Security, Point of Sale, Emerging Technologies, Transaction Processing, Digital Assets, Risk Management, Value Propositions
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Computer Hardware, Data Security, Data Storage, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Media and Communications, Internet Of Things, Algorithms, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Blockchain, Loans, FinTech, Lending and Underwriting, Cyber Risk, Operational Risk, Scalability, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, Financial Inclusion, Legal Risk, Exploit development, Derivatives, Key Management, Cryptography, Finance, Entrepreneurial Finance, Entrepreneurship
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks