
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management Framework, Risk Management, Business Risk Management, Incident Response, Vulnerability Management, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Computer Security, Risk Analysis, Threat Detection, Open Web Application Security Project (OWASP), Event Monitoring, Auditing
Beginner · Course · 1 - 4 Weeks

Pragmatic AI Labs
Skills you'll gain: LLM Application, Large Language Modeling, AI Security, Cyber Security Assessment, Application Security, Security Architecture Review, Threat Modeling, Security Testing, Secure Coding, Vulnerability Assessments, Software Architecture, Prompt Engineering, IT Security Architecture, Security Controls, Application Programming Interface (API), Model Training, Data Validation
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Intrusion Detection and Prevention, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Networking Hardware, Service Management, Identity and Access Management, Linux, Linux Commands, Incident Response, Network Security, Cybersecurity, TCP/IP, Linux Administration, Network Protocols, Cloud Computing Architecture, Computer Security Incident Management, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Network Analysis, Performance Measurement, Performance Metric, Automation
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, Cloud Services, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, Cloud Applications, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, TCP/IP, Network Infrastructure, Network Protocols, Firewall, Computer Security, Network Analysis, Exploitation techniques, General Networking, Authorization (Computing), Web Applications, Security Controls, Identity and Access Management, Authentications
Mixed · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Intrusion Detection and Prevention, Event Monitoring, Computer Security Incident Management, Malware Protection, Network Analysis, Anomaly Detection, Network Security, Network Monitoring, Network Protocols
Mixed · Course · 1 - 4 Weeks