
Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, AI Workflows, Cyber Threat Intelligence, Incident Response, AI Security, Vulnerability Assessments, Cloud Security, Threat Detection, Continuous Monitoring, Microsoft Azure, OpenAI, Incident Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Threat Management, Threat Detection, Vulnerability Assessments, Data Security, Incident Response, Tensorflow
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Supervised Learning, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, Cybersecurity, Real-Time Operating Systems, Internet Of Things, Security Information and Event Management (SIEM), Infrastructure Security, Network Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cyber Threat Intelligence, Cybersecurity, Data Loss Prevention, Threat Detection, Information Privacy, Event Monitoring, Incident Response, Automation
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Infrastructure Security, Mobile Security, Security Controls, Disaster Recovery
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Cyber Threat Intelligence, Digital Forensics, Computer Security Incident Management, Threat Detection, Cybersecurity, Mobile Security, Network Analysis
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months