Learn network security principles for protecting digital networks. Understand threats, vulnerabilities, and security measures.

University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Data Sharing, Technology Strategies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Continuous Deployment, Firewall, Virtual Private Networks (VPN), Network Administration, Proxy Servers, Capacity Management, CI/CD, Key Management, Software Versioning, Network Security, API Gateway, YAML, Identity and Access Management, Disaster Recovery, Scalability, Large Language Modeling
Beginner · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Application Security, Serverless Computing, Secure Coding, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Cloud Services, Web Applications, Cloud Platforms, Javascript, Node.JS, Amazon Web Services
Intermediate · Course · 1 - 4 Weeks

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management
Mixed · Course · 1 - 3 Months

Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks, User Accounts
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Secure Coding, Package and Software Management, Node.JS, Vulnerability Management, Javascript, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Software-Defined Networking, Zero Trust Network Access, Virtual Local Area Network (VLAN), Network Switches, Network Architecture, Network Routing, Network Security, Load Balancing, Firewall, Virtualization, Network Protocols, System Configuration, Multi-Tenant Cloud Environments, Scalability
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Threat Modeling, Cryptography, Security Testing, Security Engineering, Threat Management, Cybersecurity, Network Security, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Network Protocols, Regulatory Compliance, Scripting, Financial Regulation, Scalability
Intermediate · Specialization · 3 - 6 Months