
Macquarie University
Skills you'll gain: Data Security, Security Testing, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Cyber Risk, Cyber Security Strategy, AI Integrations, Intrusion Detection and Prevention, Cyber Threat Hunting, Data Management, Cybersecurity, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI
★ 4.6 (36) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Security Engineering, Threat Modeling, Threat Management, Cyber Security Assessment, Security Controls, Data Security, Vulnerability Assessments, Threat Detection, Information Systems Security, Cyber Security Strategy, Key Management, Encryption, Regulatory Compliance, Network Protocols, Financial Regulation, Scalability, Scripting
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Advanced Encryption Standard (AES), Cryptography, Encryption, Key Management, Brute-force attacks, Algorithms
★ 4.5 (284) · Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Key Management, Cryptography, Cryptographic Protocols, Encryption, Authentications, Algorithms
★ 4.7 (281) · Intermediate · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Cyber Attacks, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Application Security, Computer Security Incident Management, Security Management, Cyber Security Strategy, Information Systems Security, Secure Coding, Cyber Security Policies, Cyber Security Assessment, Threat Management, Threat Detection, Information Assurance, Network Security
★ 4.7 (665) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation
★ 4.5 (80) · Beginner · Specialization · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Cryptographic Protocols, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Data Integrity, Algorithms, Arithmetic, Probability
★ 4.8 (4.5K) · Mixed · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Cybersecurity, Key Management, Security Engineering, Network Protocols, Federated Learning, Data Integrity, Security Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
★ 4.8 (26K) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Authentications, Hardening, DevSecOps, Key Management, Data Security, Cloud Security, Security Management, Security Controls, Encryption, Identity and Access Management, Server Administration, System Configuration, Data Storage, Database Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Threat Detection, Large Language Modeling, Intrusion Detection and Prevention, LLM Application, Cybersecurity, Cyber Security Strategy, Applied Machine Learning, Fraud detection, AI Integrations, Cyber Engineering, IT Automation, Machine Learning Methods, Cyber Attacks, Anomaly Detection, Federated Learning, Malware Protection, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cyber Risk
Intermediate · Course · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Fraud detection, Model Evaluation, Malware Protection, Cybersecurity, Threat Detection, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Classification Algorithms, Email Security, Network Security, Jupyter, Authentications, Machine Learning Methods, Machine Learning Algorithms, Artificial Intelligence
★ 4.3 (126) · Intermediate · Specialization · 3 - 6 Months