The language used throughout the course, in both instruction and assessments.

University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Operating System Administration, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Cybersecurity, Computer Networking, Virtual Machines, Enterprise Architecture
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

ISC2
Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Information Systems Security, Multi-Factor Authentication, Computer Security
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Linux Administration, Linux, Linux Servers, Operating System Administration, User Accounts, Linux Commands, User Provisioning, Systems Administration, System Configuration, Hardening, Security Controls, Authorization (Computing), Computer Security, Network Administration, Authentications
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, IT Security Architecture, Computer Networking, IT Infrastructure, Systems Administration, Network Security, Operating System Administration, Cybersecurity, Network Architecture, Application Security, Computer Security, TCP/IP, Server Administration, Desktop Support, File Systems, Technical Support, OS Process Management, Computer Hardware, Microsoft Windows, Software Installation
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Financial Inclusion, Financial Systems, Cryptography, Digital Assets, Financial Regulation, Banking, Encryption, Computer Security, Governance
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture
Intermediate · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Linux Commands, Shell Script, Unix Commands, Operating System Administration, Systems Administration, Data Storage, Data Management, Process Management, Software Development, Computer Security
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Threat Modeling, Application Security, Computer Security, Security Controls, Cybersecurity, Security Engineering, Data Security, Network Security, Information Systems Security, Cryptography, Vulnerability Assessments, Secure Coding, Cryptographic Protocols, Encryption, Key Management, Risk Management, Public Key Cryptography Standards (PKCS), Data Integrity, Distributed Computing
Intermediate · Course · 1 - 3 Months