
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Business Writing, Risk Analysis, Communication, Presentations, Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Systems Development Life Cycle, Risk Management, Cyber Risk, Cybersecurity, NIST 800-53, Enterprise Risk Management (ERM), Operational Risk, Governance Risk Management and Compliance, Cyber Governance, Cyber Security Strategy, Security Controls, Infrastructure Security, Cyber Security Assessment, Law, Regulation, and Compliance, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months

Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Infrastructure Security, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Security Testing, Virtual Private Networks (VPN)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Vulnerability Scanning, Security Awareness, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Malware Protection, Email Security, Network Security, Fraud detection, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Beginner · Course · 1 - 4 Weeks