The language used throughout the course, in both instruction and assessments.

University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Vulnerability Assessments, Cyber Threat Intelligence, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Beginner · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks