
Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, AI Product Strategy, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Deep Learning, Vulnerability Management, Artificial Intelligence, Machine Learning, Incident Management
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Threat Modeling, Threat Detection, Computer Security Incident Management, Malware Protection, Cybersecurity, Cyber Attacks, Network Analysis, Microsoft Windows, Operating Systems, Virtual Environment
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Threat Management, Application Security, Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Anomaly Detection, Cyber Engineering, Cyber Operations, Cyber Threat Intelligence, Threat Detection, Security Awareness, Network Analysis, Generative AI, Prompt Engineering, Email Security, Machine Learning
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Network Security, Technical Communication
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating Systems, Network Security, Network Support, Network Troubleshooting, System Support, Data Storage, Microsoft Windows, Systems Administration, Mac OS, Technical Support, System Configuration, Command-Line Interface, Software Installation, Linux, Help Desk Support, Encryption, Mobile Security, Information Technology, Firewall, Malware Protection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks