
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Threat Detection, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Network Monitoring, Vulnerability Assessments, Cloud Security, Malware Protection, Mobile Security, Identity and Access Management, Risk Analysis, Internet Of Things, Web Applications
Beginner · Professional Certificate · 3 - 6 Months

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cybersecurity, Malware Protection, Cyber Attacks, Network Security, Information Systems Security, Intrusion Detection and Prevention, Security Testing, Penetration Testing, Firewall, Threat Detection, Internet Of Things, Exploitation techniques, Network Analysis
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months