
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration
★ 4.8 (90) · Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, Cybersecurity, Data Security, Cyber Governance, Cyber Security Policies, Computer Security, Digital Assets, Security Testing, Data Analysis Software, Cyber Risk, Incident Management
★ 4.3 (15) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness
★ 4.7 (4.5K) · Beginner · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Data Presentation, Trend Analysis, Data Literacy, Content Performance Analysis, Analysis, Data Analysis, Web Analytics, Data-Driven Decision-Making, Stakeholder Communications, Performance Metric, Data Management, Decision Making
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Network Protocols, Network Monitoring, Network Analysis, TCP/IP, Cyber Security Assessment, Network Security, User Interface (UI)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages
★ 4.8 (3.4K) · Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Incident Management, Threat Management, Model Training, Continuous Monitoring, Cyber Security Policies, System Monitoring, AI Security, Virtual Machines, Network Security, Machine Learning Methods, Network Analysis, Data Analysis
★ 4.8 (8) · Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Model Training, Threat Modeling, Machine Learning Methods, Python Programming
★ 4.8 (8) · Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
★ 4 (10) · Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows
★ 4.7 (23) · Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Exploitation techniques, Cyber Operations, Cybersecurity, Malware Protection, Cyber Attacks, Data Security, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Anomaly Detection, Fraud detection, Data Visualization, Generative AI, Risk Management, Risk Mitigation, ChatGPT, Data Synthesis, Compliance Management, AI Integrations, Test Data, AI Workflows, Data Pipelines, Automation
Intermediate · Course · 1 - 4 Weeks