
Skills you'll gain: Responsible AI, Large Language Modeling, IT Security Architecture, Data Ethics, Threat Modeling, Vulnerability Assessments, Security Engineering, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Artificial Intelligence, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Centers, Network Security, Virtualization and Virtual Machines, Network Troubleshooting, Network Monitoring, Wide Area Networks, Virtualization, Wireless Networks, Firewall, Hardening, Network Architecture, Network Infrastructure, Virtual Private Networks (VPN), Infrastructure Security, TCP/IP, Cloud Computing, Security Information and Event Management (SIEM), Remote Access Systems, Network Protocols, Internet Of Things
Advanced · Course · 1 - 3 Months

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Application Security, Cloud Computing, Cloud Infrastructure, Cloud Applications, IT Security Architecture, Identity and Access Management, Data Integrity, Secure Coding, Private Cloud, Security Awareness, Data Centers, Data Management, Personally Identifiable Information, Threat Modeling, Security Testing, Security Controls, General Data Protection Regulation (GDPR), Service Level
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Governance Risk Management and Compliance, Security Management, Compliance Management, Risk Appetite, Risk Analysis, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Risk, Cyber Security Policies, Governance, Data Governance, Vulnerability Assessments, Security Awareness, Vendor Management
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Information Privacy
Beginner · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Responsible AI, Data Ethics, Threat Modeling, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain
Intermediate · Course · 1 - 3 Months

Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Threat Management, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Intrusion Detection and Prevention, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Application Security
Intermediate · Specialization · 1 - 3 Months