The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Personally Identifiable Information, Threat Detection, Cybersecurity, Cyber Attacks, Vulnerability Scanning, Information Privacy, Data Security, Security Awareness, Human Factors (Security), User Accounts
Beginner · Course · 1 - 4 Weeks

Illinois Institute of Technology
Skills you'll gain: Industrial and Organizational Psychology, Infrastructure As A Service (IaaS), Data Storytelling, Cloud-Native Computing, Serverless Computing, Javascript and jQuery, Network Troubleshooting, Database Management Systems, Time Series Analysis and Forecasting, Open Source Technology, Project Scoping, Networking Hardware, Virtualization, Unified Modeling Language, Cybersecurity, Cloud Security, Computer Hardware, Design Thinking, Team Oriented, DevSecOps
Earn a degree
Degree · 1 - 4 Years

Macquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Security Controls, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases
Beginner · Specialization · 3 - 6 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

EIT Digital
Skills you'll gain: Real-Time Operating Systems, Embedded Software, Embedded Systems, Internet Of Things, Cryptography, Operating Systems, Network Architecture, Network Security, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), Wireless Networks, Threat Modeling, System Programming, Computer Programming, Software Engineering, C (Programming Language), Real Time Data
Intermediate · Specialization · 3 - 6 Months

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Public Key Cryptography Standards (PKCS), Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Verification And Validation
Beginner · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Zero Trust Network Access, Cybersecurity, Vulnerability Assessments, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Network Security, Threat Modeling, Security Strategy, Security Controls, Cloud Security, Authentications, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, AWS Identity and Access Management (IAM), Encryption, Personally Identifiable Information, Data Security, Authentications, Threat Detection, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Open Shortest Path First (OSPF), Network Routing, Cybersecurity, Network Security, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Network Architecture, System Configuration, Network Analysis
Beginner · Course · 1 - 3 Months

Build toward a degree
Professional Certificate

Build toward a degree
Course

Build toward a degree
Professional Certificate

Professional Certificate

Build toward a degree
Professional Certificate

Specialization

Build toward a degree
Course

Vanderbilt University
Specialization

Professional Certificate

Macquarie University
Course

SkillUp
Course

LearnKartS
Specialization