
Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Vulnerability Management, Cyber Risk, Security Management, Cyber Security Assessment, Simulations, Configuration Management, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Security Information and Event Management (SIEM), Cyber Security Policies, Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Computer Architecture, Excel Macros, Linux, File Management
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months