
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, MITRE ATT&CK Framework, Incident Response, Vulnerability Management, Google Gemini, Interactive Data Visualization, Continuous Monitoring, Cloud Security
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Anomaly Detection, Fraud detection, Data Visualization, Generative AI, Risk Management, ChatGPT, Data Synthesis, Compliance Management, Unsupervised Learning, Test Data, Data Pipelines, Automation, Predictive Analytics, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

Campus BBVA
Skills you'll gain: Incident Response, Security Management, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Data Security, Email Security, Mobile Security, Business Process, Authentications, Fraud detection, Identity and Access Management, Multi-Factor Authentication, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Enterprise Architecture, Cybersecurity, Application Security, Threat Management, Network Security, Systems Architecture, Identity and Access Management, Solution Architecture, Endpoint Security, Data Security, Risk Analysis, Remote Access Systems, Case Studies, Risk Management
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Feature Engineering, Data Ethics, Unsupervised Learning, Dimensionality Reduction, Responsible AI, Text Mining, Data Transformation, Anomaly Detection, Exploratory Data Analysis, Machine Learning, Natural Language Processing, Data Science, Quality Assurance, Data Validation, Machine Learning Algorithms, Data Visualization, Python Programming
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Cyber Threat Intelligence, Personally Identifiable Information, Information Privacy, Data Ethics, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53, Identity and Access Management
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months