
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Anomaly Detection, AI Security, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Security Strategy, Incident Response, End User Training and Support, Human Factors (Security), Security Awareness
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Public Cloud, Network Security, Data Storage, Identity and Access Management, Data Centers, Encryption
Beginner · Course · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms, Computational Thinking
Mixed · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cyber Operations, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Security Engineering, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation, Critical Thinking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Attacks, Secure Coding, Cyber Security Policies, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Risk, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Anomaly Detection, Applied Machine Learning, Network Security, Machine Learning, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
Intermediate · Course · 1 - 3 Months

University of Leeds
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, NIST 800-53, Digital Forensics, Security Controls, Disaster Recovery, Authorization (Computing), Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Change Control, Cybersecurity, Threat Management, Risk Management, System Monitoring, Security Strategy, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Vulnerability Management
Intermediate · Specialization · 3 - 6 Months