
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Climate Change Adaptation, Resilience, Change Management, Threat Detection, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Business Ethics, Communication, Risk Management, Risk Analysis, Sustainable Development
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Cyber Threat Intelligence, Responsible AI, Cybersecurity, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, AI Product Strategy, Data Ethics, Security Testing, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Continuous Integration, Code Coverage, Vulnerability, Code Review, CI/CD, Application Security, DevSecOps, Vulnerability Assessments, Software Quality Assurance, Maintainability, Software Quality (SQA/SQC), GitHub, Software Installation, System Configuration, Security Management, Data Integration, Quality Improvement, Analysis
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Linux, Linux Administration, Network Security, Role-Based Access Control (RBAC), Linux Commands, User Accounts, Network Monitoring, System Monitoring, Network Administration, Hardening, Information Systems Security, Security Controls, Wireless Networks, Firewall, Penetration Testing, Cybersecurity, Containerization, File Management
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Security Strategy, Security Controls, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Vulnerability Assessments, Threat Detection, Cloud Management, Encryption, Security Information and Event Management (SIEM), Identity and Access Management, Incident Response
Advanced · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Security, System Configuration, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Identity and Access Management, Vulnerability Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months