
Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, System Configuration, Software Installation, Network Analysis, Technical Writing
Intermediate · Course · 1 - 4 Weeks

SkillUp
Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Incident Response, Cyber Risk, Responsible AI, Data Ethics, Threat Detection, Malware Protection, Information Systems Security, Network Security, Security Controls, Data Security, Multi-Factor Authentication, Personally Identifiable Information, Email Security, Authentications
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours
Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages
Intermediate · Course · 1 - 3 Months

Universidad Nacional Autónoma de México
Skills you'll gain: Financial Regulation, Bank Regulations, Payment Systems, Blockchain, Tax Laws, FinTech, Cyber Risk, Digital Assets, Risk Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Network Security, Technical Communication
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
Advanced · Course · 1 - 3 Months

Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
Beginner · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Cloud Computing, Cloud Computing Architecture, Process Optimization, Process Improvement, Manufacturing Operations, Manufacturing and Production, Internet Of Things, Innovation, Workforce Development, Cybersecurity, Manufacturing Processes, Automation, Augmented and Virtual Reality (AR/VR), Blockchain, Cloud Security, Workforce Planning, Digital Transformation, Technology Strategies, Industrial Engineering, Change Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months