
Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Strategy, Data Management, Law, Regulation, and Compliance, Cyber Governance, Incident Response, Cyber Security Policies, Cyber Security Strategy, Artificial Intelligence, Data Science, Cybersecurity, Risk Analysis, Stakeholder Engagement, Cyber Operations
Beginner · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Computer Hardware, Operating Systems, Desktop Support, Databases, Hardware Troubleshooting, Information Technology, Technical Support, Computer Systems, System Configuration, Information Systems Security, General Networking, Networking Hardware, Application Deployment, Wireless Networks, Security Awareness, Software Installation, Computer Networking, Computer Security Awareness Training, Data Storage, Peripheral Devices
Beginner · Course · 3 - 6 Months

Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Wireless Networks, Authentications, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Cyber Threat Intelligence, Continuous Monitoring, Document Management, Cybersecurity, Technical Documentation, NIST 800-53
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Attacks, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Blockchain, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Digital pedagogy, Computer Science, Social Impact, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Computer Security Incident Management, Threat Management, OSI Models, Business Risk Management, Disaster Recovery, Cryptography, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Network Administration, Infrastructure Security, Encryption, Cloud Computing, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Email Security, Application Security, Human Factors (Security), Network Infrastructure, Network Protocols, Local Area Networks, Data Security, Authentications, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months