Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cybersecurity, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks
Skills you'll gain: DevSecOps, Kubernetes, Cloud Security, Cloud-Native Computing, Cyber Security Policies, Security Controls, Continuous Monitoring, Authorization (Computing), Policy Development, CI/CD, Policy Analysis, Open Source Technology, Cross Platform Development, Configuration Management, JSON
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Disaster Recovery, Business Continuity Planning, Database Management, Database Administration, Problem Management, Relational Databases, Incident Management, Service Management, Information Systems, Software Development Methodologies, IT Management, Asset Management, Project Design, Object Oriented Design, Agile Methodology
Intermediate · Course · 1 - 4 Weeks

West Virginia University
Skills you'll gain: Fraud detection, Internal Controls, Anomaly Detection, Financial Auditing, Cybersecurity, Investigation, Analytics, Big Data, Accounting, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
Mixed · Course · 1 - 3 Months

Packt
Skills you'll gain: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Risk Management, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Cryptography
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Audit Planning, Enterprise Architecture, Compliance Management, Regulatory Compliance, Quality Assurance, Enterprise Risk Management (ERM), Quality Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Incident Response, Intrusion Detection and Prevention, Network Security, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Data Security, Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Vulnerability Assessments, Multi-Factor Authentication, System Configuration, Scripting, Linux Commands, Bash (Scripting Language), Linux, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Security Requirements Analysis, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks