The language used throughout the course, in both instruction and assessments.

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Server Side
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Linux, Cloud-Native Computing, Network Security, Linux Administration, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Network Troubleshooting, Operating System Administration, Cloud Storage, Linux Commands, Software-Defined Networking, User Accounts, Cloud Infrastructure, Network Monitoring, Command-Line Interface, Threat Modeling, Cloud Services, Data Infrastructure
Build toward a degree
Beginner · Specialization · 3 - 6 Months

Fractal Analytics
Skills you'll gain: Threat Modeling, LLM Application, Generative AI Agents, Application Security, Software Architecture, Systems Architecture, Security Controls, Security Engineering, Interoperability, Agentic systems, Real Time Data, Artificial Intelligence, Network Protocols, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Exploit development, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Microsoft Azure, Threat Modeling, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Data Integration, ChatGPT, Jupyter, AI Product Strategy, Automation, Query Languages
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Regulatory Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Software-Defined Networking
Beginner · Specialization · 1 - 4 Weeks

Build toward a degree
Professional Certificate

Vanderbilt University
Specialization

University of Maryland, College Park
Course

Course

Build toward a degree
Professional Certificate

Specialization

Vanderbilt University
Specialization

Microsoft
Professional Certificate

Macquarie University
Course

Pearson
Course

Edureka
Course