
Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Embedded Systems, Embedded Software, Robotics, Electronic Systems, PIC Microcontrollers, Computer Systems, Internet Of Things, Automation, Control Systems, C (Programming Language), Peripheral Devices, Wireless Networks, Medical Devices, Electric Power Systems, Computer Architecture, Civil Engineering, Cybersecurity, Public Works, Cloud Computing, Electronic Hardware
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Management, Regulatory Compliance, Cyber Threat Intelligence, Threat Modeling, Cyber Security Strategy, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cybersecurity, Governance Risk Management and Compliance, Strategic Decision-Making, Risk Mitigation, Insurance, Risk Modeling, Compliance Management
Intermediate · Specialization · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Continuous Monitoring, Security Management, Cyber Governance, Risk Management, Security Controls, Infrastructure Security, Cyber Security Assessment, Incident Response, Vulnerability Assessments, Authorization (Computing), Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Anomaly Detection, AI Security, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Threat Modeling, Cyber Threat Hunting, Information Systems Security, Threat Detection, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: AI Security, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Responsible AI, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science
Beginner · Specialization · 3 - 6 Months