
Johns Hopkins University
Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Saïd Business School, University of Oxford
Skills you'll gain: Responsible AI, Data Ethics, Governance, Governance Risk Management and Compliance, Compliance Management, Enterprise Risk Management (ERM), Risk Management Framework, Risk Management, Business Ethics, Artificial Intelligence, Ethical Standards And Conduct, Organizational Strategy, Law, Regulation, and Compliance, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Generative AI, Information Management, Agentic systems, Generative AI Agents, Business Leadership
Beginner · Course · 1 - 3 Months
Microsoft
Skills you'll gain: Prompt Engineering, Prompt Engineering Tools, Prompt Patterns, Microsoft Copilot, AI Integrations, AI Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Threat Detection, Generative AI
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Computer Security Incident Management, Vulnerability Assessments, Cloud Computing Architecture, Endpoint Detection and Response, Cloud Computing, Intrusion Detection and Prevention, Event Monitoring, Cybersecurity, Security Management, Cyber Attacks, Data Security, Security Strategy, User Provisioning, Infrastructure Security, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Threat Management, Computer Security Incident Management, Penetration Testing, Network Security, Security Controls, Security Testing, Cloud Computing, Cloud Computing Architecture, Threat Detection, Incident Management, Cloud Deployment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Information Technology Operations, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Configuration Management, Continuous Monitoring, Vulnerability Management, Digital Forensics
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Risk Management Framework, Network Security, Incident Response, Threat Management, Cloud Security, Risk Analysis, Cryptographic Protocols, Cyber Attacks, Business Risk Management, Encryption, Cyber Security Policies, Cyber Threat Intelligence, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Endpoint Detection and Response, Threat Detection, Incident Response, Cloud Security, Cyber Threat Intelligence, Computer Security Incident Management, Microsoft Azure, Security Information and Event Management (SIEM), Endpoint Security, Azure Active Directory, Incident Management, Security Controls, Multi-Cloud, Anomaly Detection, Email Security, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Automation, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Malware Protection, Network Analysis, Encryption
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Deployment, Cloud Computing, Incident Response, IT Security Architecture, Cloud Infrastructure, Cloud Solutions, Incident Management, Cloud Standards, Capacity Management, Application Security, Security Controls, Network Security, Data Security, Hardening, Scalability, Emerging Technologies, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks