
John Wiley & Sons
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Security Testing, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Risk Management, Information Systems Security, Vulnerability Scanning, Vulnerability Assessments, Security Controls, Penetration Testing, Incident Response, Vendor Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Computer Security, Risk Analysis, Threat Detection, Open Web Application Security Project (OWASP), Event Monitoring, Auditing
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Hunting, Data Security, Security Strategy, Email Security, Authentications, Security Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Linux Administration, Unix Commands, File Management, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, Cloud Computing, Linux, Linux Commands, Linux Administration, Cloud Computing Architecture, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Virtual Machines, Firewall, Virtualization, Knowledge of Apple Software, File Management, User Accounts
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Exploitation techniques, Penetration Testing, Cyber Attacks, Data Persistence, Scripting, IT Automation, Network Monitoring, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Board Infinity
Skills you'll gain: Risk Management Framework, Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Cyber Risk, Business Continuity, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Incident Management, Operational Risk, Business Risk Management
Intermediate · Specialization · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Risk Management Framework, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Authorization (Computing), Network Security, Threat Management, Event Monitoring, Security Strategy
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Model Training, Threat Modeling, Machine Learning Methods, Python Programming
Intermediate · Course · 1 - 3 Months