
Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Secure Coding, Cyber Security Policies, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Continuous Monitoring, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Event Monitoring, Data Security, Vulnerability, System Monitoring, Analysis, Network Security, Network Monitoring, Criminal Investigation and Forensics, Linux Commands, System Configuration, Bash (Scripting Language), Python Programming, Scripting, Linux, Scripting Languages
Mixed · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Systems Security, Information Assurance, Security Controls, Security Management, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Data Security, Risk Management Framework, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Management, Cyber Security Policies, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Governance, Network Infrastructure, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Computing, Cryptography, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Operations, Information Systems Security, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploit development, Exploitation techniques, Cyber Attacks, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks