
Infosec
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Jupyter, Data Modeling, Model Deployment, Data Science, Data Preprocessing, Data Cleansing, Data Mining, Model Evaluation, Business Analysis, Data Analysis, Business Requirements, Decision Tree Learning, Data Storytelling
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Security Controls, Blockchain, Security Testing, Network Infrastructure, Network Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Network Protocols, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Business Continuity Planning, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Edureka
Skills you'll gain: AI Security, Responsible AI, Data Ethics, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain
Intermediate · Course · 1 - 3 Months
University of Leeds
Skills you'll gain: Data Presentation, Data Storytelling, Technical Communication, Technical Writing, Data Literacy, Communication, Writing, Generative AI, Responsible AI
Intermediate · Course · 1 - 4 Weeks
Johns Hopkins University
Skills you'll gain: Data Quality, Exploratory Data Analysis, Employee Onboarding, Data Management, Statistical Reporting, Team Motivation, Technical Communication, Data Analysis, Data Presentation, Project Management, Interviewing Skills, Data Science, Data-Driven Decision-Making, Data Strategy, Organizational Leadership, Team Management, Workflow Management, Analytical Skills, Leadership, Communication
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Anomaly Detection, AI Security, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Network Analysis, Machine Learning, Machine Learning Algorithms, Model Evaluation, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months