
Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, Cyber Threat Intelligence, Incident Response, Generative AI Agents, Vulnerability Assessments, Computer Security Incident Management, Cloud Security, Threat Detection, IT Automation, Microsoft Azure, OpenAI, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

ESSEC Business School
Skills you'll gain: Crisis Management, Performance Management, Business Continuity, Risk Management, Organizational Change, Business Communication, Communication, Action Oriented, Organizational Development, Decision Making
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Incident Response, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Unsupervised Learning, Supervised Learning, Deep Learning, Artificial Neural Networks
Intermediate · Course · 1 - 3 Months
Erasmus University Rotterdam
Skills you'll gain: Corporate Communications, Crisis Management, Business Ethics, Case Studies, Facebook, Stakeholder Management, Business Management, Social Sciences, Policy Analysis, Data Ethics, Leadership, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Malware Protection, Network Analysis
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Network Security, Technical Communication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Fraud detection, Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Data Manipulation, Applied Machine Learning, Statistical Machine Learning, Decision Tree Learning, Machine Learning Methods, Supervised Learning, Predictive Modeling, Machine Learning, Predictive Analytics
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Cyber Threat Hunting, Event Monitoring, Technical Communication, Cyber Security Policies, Vulnerability Management, Continuous Monitoring, Threat Management, Security Controls, Communication Strategies, Root Cause Analysis
Intermediate · Course · 1 - 4 Weeks