
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Blockchain, Cryptography, Application Security, Encryption, Network Security, Security Engineering, Cybersecurity, Vulnerability Assessments, Transaction Processing, Data Validation, Distributed Computing, Data Integrity, Network Protocols, Data Mining, Verification And Validation
Beginner · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Threat Modeling, Secure Coding, Application Security, Blockchain, Scripting, Vulnerability Assessments, Scalability, Application Design, Payment Systems, Transaction Processing, Cryptography, FinTech, Emerging Technologies
Intermediate · Course · 1 - 4 Weeks

Fortinet, Inc.
Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Authentications, Network Monitoring, Event Monitoring, Network Administration, Security Information and Event Management (SIEM), Security Engineering, Threat Management, Network Infrastructure, Network Performance Management, Systems Administration, Application Security, Cybersecurity, Computer Security, Cyber Security Strategy
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Email Security, Google Workspace, Mobile Security, Security Management, Cloud Security, Application Security, Data Security, Security Controls, Identity and Access Management, Continuous Monitoring, Authentications, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Web Scraping, Data Visualization, Data Presentation, Data Cleansing, Exploratory Data Analysis, Scripting, Data Analysis, Data Manipulation, Data Import/Export, Data Capture, Data Transformation, Python Programming, Jupyter
Intermediate · Guided Project · Less Than 2 Hours

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Security Awareness, Cyber Attacks, Cyber Risk, Mobile Security, Cybersecurity, Cyber Security Strategy, Cyber Governance, Malware Protection, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Data Security, Cyber Threat Hunting, Human Factors (Security), Email Security, Identity and Access Management, Security Management, Security Strategy, Multi-Factor Authentication, Cloud Security
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection
Beginner · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Security Controls, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases
Beginner · Specialization · 3 - 6 Months