
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Color Theory, Typography, Adobe Photoshop, Photo Editing, Graphic and Visual Design, Design Elements And Principles, Visual Design, Design, Game Design, Graphic Design, Creative Design, Image Quality
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Solution Architecture, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Incident Response, Vulnerability Assessments, Systems Architecture, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Endpoint Detection and Response, Threat Management, Cyber Operations, Security Management, Threat Detection, Information Technology Operations, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Automation, Data Integration
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cyber Threat Intelligence, Cybersecurity, Data Loss Prevention, Threat Detection, Information Privacy, Event Monitoring, Incident Response, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months