
Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
Beginner · Course · 1 - 4 Weeks

CertNexus
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Mobile Security, Generative AI, Cyber Security Policies, Human Factors (Security), Computer Security, Email Security, Data Security, Safety and Security, Data Ethics, Cloud Security, Law, Regulation, and Compliance, Artificial Intelligence, Regulatory Compliance, Prompt Engineering, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Regulation and Legal Compliance, Ethical Standards And Conduct
Mixed · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Malware Protection, Penetration Testing, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Security Engineering, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Vulnerability Assessments, Cloud Security, Persistence
Mixed · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Digital Forensics, Criminal Investigation and Forensics, Investigation, File Systems, Mobile Security, Cybersecurity, Data Security, Data Integrity, Malware Protection, File Management, Computer Security Incident Management, Incident Response, Data Storage, Real Time Data, Disaster Recovery, Linux, Network Analysis, Regulation and Legal Compliance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks

CertNexus
Skills you'll gain: Threat Modeling, Cybersecurity, Cyber Threat Intelligence, Threat Management, Information Systems Security, Threat Detection, Security Management, Cyber Risk, Security Strategy, Cyber Security Strategy, Risk Analysis, Computer Security, Risk Mitigation, Risk Management, Network Security, Risk Management Framework, Enterprise Risk Management (ERM), Risk Appetite, Trend Analysis, Technical Documentation
Mixed · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Attacks, Cyber Risk, Legal Risk, Security Awareness, Information Systems Security, Human Factors (Security), Computer Security, Public Safety and National Security, Infrastructure Security, Data Security, Risk Management
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Anomaly Detection, AI Security, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Network Analysis, Machine Learning, Machine Learning Algorithms, Model Evaluation, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks