
Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, Test Automation, Secure Coding, Technical Communication
Intermediate · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Information Assurance, Security Controls, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Endpoint Detection and Response, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Risk Management Framework, Technical Communication, Vulnerability Assessments, Data Integrity, Automation
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
Beginner · Specialization · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Anomaly Detection, Threat Modeling, Cyber Security Strategy, Security Controls, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Responsible AI, Cryptography, DevSecOps, Encryption, Secure Coding, Data Security, Cybersecurity, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Cloud-Native Computing, Security Controls, Application Security, Cloud Security, CI/CD, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Software Development, Software Architecture
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, Network Protocols, Technical Documentation, Query Languages
Beginner · Course · 1 - 4 Weeks