
Skills you'll gain: Threat Modeling, Data Visualization, Data Presentation, AI Security, Interactive Data Visualization, A/B Testing, Threat Management, Open Web Application Security Project (OWASP), Secure Coding, Application Security, Responsible AI, System Monitoring, MLOps (Machine Learning Operations), Analytics, Data Governance, Application Programming Interface (API), Vulnerability Assessments, Cyber Governance, Data Processing, Data Management
Intermediate · Course · 1 - 3 Months
Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Package and Software Management, Information Technology, IT Automation, Network Administration, General Networking, Software Installation
★ 4.6 (166) · Beginner · Specialization · 3 - 6 Months

Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications
★ 4.5 (20) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
★ 4.7 (59) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, Network Security, Authorization (Computing), Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months

Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
★ 4.7 (251) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Computer Security Incident Management, Zero Trust Network Access, Cloud Computing Architecture, Authentications, Endpoint Detection and Response, Risk Analysis, Network Security, Compliance Training, Risk Mitigation, Risk Management Framework, Cyber Governance, Regulatory Compliance, Cloud Computing, Data Security, Application Security, Cyber Risk, Information Systems Security, Risk Management
★ 4.8 (13) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Process Modeling, Process Mapping, Business Process Modeling, Process Analysis, Business Analysis, Data Storytelling, Business Analysis Tools, Business Process Improvement, Feasibility Studies, Systems Analysis, Stakeholder Analysis, Process Optimization, Requirements Management, Business Systems Analysis, Systems Design, Communication Planning, Test Planning, Information Technology, Database Management, Agile Methodology
★ 4.7 (4.8K) · Beginner · Professional Certificate · 3 - 6 Months

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Operating System Administration, OSI Models, User Accounts, Group Policy, Security Management, Ubuntu, System Monitoring, Cyber Security Policies, IT Management, Systems Administration, Cybersecurity
★ 4.6 (1.9K) · Beginner · Specialization · 3 - 6 Months