
Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cyber Attacks, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Skills you'll gain: Audit Planning, Network Security, Disaster Recovery, Cyber Attacks, Business Continuity Planning, Security Testing, Digital Forensics, Infrastructure Security, Identity and Access Management, Database Management, Enterprise Architecture, Database Administration, Compliance Management, Regulatory Compliance, Auditing, Quality Assurance, Cloud Computing, OSI Models, Asset Management, Quality Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Brute-force attacks, Cybersecurity, Vulnerability Assessments, Linux, Command-Line Interface, Cryptography, File Management, Microsoft Windows, Scripting, Virtual Machines
Intermediate · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Modeling, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Data Security, Identity and Access Management, Infrastructure Security, Hardening
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Risk Management Framework, Infrastructure Security, Safety Assurance, Threat Modeling, Information Systems Security, Security Controls, Security Engineering, Security Requirements Analysis, Safety Standards, Safety and Security, Cybersecurity, Cyber Security Strategy, Continuous Monitoring, Cyber Risk, Hardening, Vulnerability Assessments, Cyber Security Policies, Cyber Security Assessment, Industrial Design
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Data Sharing, Security Controls, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Law, Regulation, and Compliance, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Security Strategy, Telecommuting, Infrastructure Security
Beginner · Specialization · 1 - 3 Months