
Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Application Security, Business Continuity Planning, Asset Management, Cloud Security, Network Security, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

University of Toronto
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Machine Learning Algorithms, Python Programming, Linear Algebra
Advanced · Course · 1 - 3 Months

Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Security Controls, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases
Beginner · Specialization · 3 - 6 Months

Alfaisal University | KLD
Skills you'll gain: Bank Regulations, Financial Regulation, Fraud detection, International Finance, Auditing, Banking, Compliance Reporting, Commercial Laws, Economics
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Generative AI, Microsoft Copilot, Responsible AI, Data Ethics, Data Security, Data Synthesis, Anomaly Detection, Simulations, Data Analysis
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Social Network Analysis, Social Sciences, Network Analysis, Data Science, Machine Learning, Computational Thinking, Artificial Intelligence, Data Analysis, Simulations, Big Data, Scientific Methods
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Network Security, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Climate Change Adaptation, Resilience, Change Management, Threat Detection, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Business Ethics, Communication, Risk Management, Risk Analysis, Sustainable Development
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
Intermediate · Course · 1 - 4 Weeks