
Skills you'll gain: Incident Response, Threat Modeling, Threat Detection, Computer Security Incident Management, Malware Protection, Cybersecurity, Cyber Attacks, Network Analysis, Operating Systems, Virtual Environment
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Security Requirements Analysis, Requirements Analysis, Risk Management Framework, Risking, User Requirements Documents, Scalability, Verification And Validation, Software Visualization, Safety and Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, Cyber Threat Intelligence, Incident Response, Generative AI Agents, Vulnerability Assessments, Computer Security Incident Management, Cloud Security, Threat Detection, IT Automation, Microsoft Azure, OpenAI, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Security Controls, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks