
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security, Threat Modeling, Infrastructure Security, Telecommunications, Threat Detection, Enterprise Security, Security Awareness, General Networking, Data Security, Vulnerability, Public Safety and National Security, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Prompt Engineering, Prompt Patterns, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), ChatGPT, Threat Modeling, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, AI Product Strategy, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Deep Learning, Vulnerability Management, Image Quality, Artificial Intelligence, Incident Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Cyber Security Strategy, Cyber Security Policies, Information Systems Security Assessment Framework (ISSAF), Network Security, Computer Security Awareness Training, Cyber Risk, Security Awareness, Data Security, Technical Support and Services, Information Assurance, Information Technology, General Networking
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, IT Automation, Scripting, Python Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Data Ethics, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Threat Modeling, Cybersecurity, Cyber Attacks, Incident Response, Security Information and Event Management (SIEM), Google Gemini
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Google Gemini, Vulnerability Management, Continuous Monitoring, Infrastructure Security, Technical Analysis
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, Incident Response, Endpoint Detection and Response, Computer Security Incident Management, Security Information and Event Management (SIEM), Google Gemini, Infrastructure Security, Vulnerability Assessments, Interactive Data Visualization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours