
Skills you'll gain: Application Security, Incident Response, Intrusion Detection and Prevention, Network Security, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Data Security, Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Vulnerability Assessments, Multi-Factor Authentication, System Configuration, Scripting, Linux Commands, Bash (Scripting Language), Linux, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: AI Security, Responsible AI, Cyber Security Strategy, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Beginner · Course · 1 - 3 Months

CertNexus
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Mobile Security, Generative AI, Cyber Security Policies, Human Factors (Security), Computer Security, Email Security, Data Security, Safety and Security, Data Ethics, Cloud Security, Law, Regulation, and Compliance, Artificial Intelligence, Regulatory Compliance, Prompt Engineering, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Regulation and Legal Compliance, Ethical Standards And Conduct
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Electrical Engineering, electromagnetics, Performance Tuning, Image Quality, Engineering, Scientific, and Technical Instruments, Simulation and Simulation Software, Engineering Calculations, Design Software, Image Analysis, Engineering Analysis, Computer-Aided Design, Engineering Design Process, Numerical Analysis, Electronic Components, System Design and Implementation, Systems Design, Human Factors, Applied Mathematics, Physics, System Configuration
Build toward a degree
Advanced · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Awareness, Cloud Computing Architecture, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Application Security, Threat Detection, Information Systems Security, Network Security, Computer Security, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Responsible AI, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Anomaly Detection, AI Security, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Network Analysis, Machine Learning, Machine Learning Algorithms, Model Evaluation, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months