
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Code Coverage, Embedded Software, Real-Time Operating Systems, Performance Testing, System Testing, Software Testing, User Acceptance Testing (UAT), Verification And Validation, Embedded Systems, Scenario Testing, Acceptance Testing, Test Tools, Test Execution Engine, Unit Testing, Test Case, Test Planning, Integration Testing, Simulations, System Requirements, Real Time Data
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, IT Automation, Identity and Access Management, System Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Security Testing, Data Management, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, System Testing, Cyber Threat Intelligence, Authorization (Computing), General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Active Directory, Data Ethics, Responsible AI, LLM Application
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Software Documentation, Test Automation, Generative AI, Software Testing, Vulnerability Scanning, Vulnerability Assessments, Test Case, Security Testing, Secure Coding, Full-Stack Web Development, Technical Documentation, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks