
Skills you'll gain: Endpoint Security, Cybersecurity, Compliance Auditing, IT Service Management, Cyber Governance, Regulatory Compliance, Cyber Risk, Encryption, Law, Regulation, and Compliance, Compliance Management, ISO/IEC 27001, Information Technology, Patch Management, User Accounts, Risk Management, Regulatory Requirements, Data Ethics, NIST 800-53, Responsible AI, AI Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Mitigation, Cyber Security Strategy, Computer Security, Computer Security Awareness Training, Malware Protection, Data Security, Threat Detection, Information Privacy, Incident Response
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: AI Security, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Responsible AI, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science
Beginner · Specialization · 3 - 6 Months

Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Threat Intelligence, Virtual Private Networks (VPN), Information Privacy, Social Media
Beginner · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Computing, Cryptography, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cyber Threat Intelligence, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Brute-force attacks, Encryption, Network Security, Technical Writing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Cyber Security Policies, Incident Response, Cyber Governance, Vulnerability Assessments, Network Security, Application Security, Cloud Security, Risk Management, Encryption, Authentications
Beginner · Course · 1 - 3 Months