
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
★ 4 (10) · Intermediate · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Cyber Attacks, Cyber Governance, Cyber Security Strategy, Security Management, Infrastructure Security, Data Security, Threat Modeling, Computer Security, Security Awareness, Risk Management, Enterprise Security, Vulnerability, Governance, General Networking, Public Safety and National Security, Threat Detection, Artificial Intelligence
★ 4.7 (3.3K) · Beginner · Specialization · 3 - 6 Months
Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis
★ 4.7 (7) · Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks
★ 4.7 (1.9K) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Model Optimization, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Applied Machine Learning, Email Security, Network Security, Jupyter, Unsupervised Learning, Authentications, Machine Learning Algorithms
★ 4.3 (123) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
★ 4.8 (4.1K) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Cybersecurity, Malware Protection, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Human Factors (Security), Cloud Security, Persistence, Data Persistence
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
★ 4.6 (18) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages
★ 4.8 (3.4K) · Beginner · Course · 1 - 4 Weeks