
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, IT Service Management, Problem Management, Return On Investment, IT Management, Business Risk Management, Information Technology Infrastructure Library, NIST 800-53, Test Planning, Communication Planning, Continuous Improvement Process, Stakeholder Communications, Simulations
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months

Skills you'll gain: Cybersecurity, Network Protocols, Threat Management, Threat Modeling, Security Controls, Responsible AI, Cyber Security Strategy, Cyber Attacks, Secure Coding, Cyber Security Policies, Data Security, Security Awareness, Computer Security Awareness Training, Agile Methodology, Cyber Threat Intelligence, Network Security, TCP/IP, Incident Response, Threat Detection, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Security Controls, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Network Security, Networking Hardware, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)
Beginner · Specialization · 3 - 6 Months