
Pearson
Skills you'll gain: Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, IT Security Architecture, Computer Security, Security Architecture Review, Network Security, Security Strategy, Cloud Standards, Cloud Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Management, Governance, Risk Management Framework, ISO/IEC 27001, Business Risk Management, Risk Analysis, Governance Risk Management and Compliance, Enterprise Risk Management (ERM), Cyber Governance, NIST 800-53, Cyber Risk, Compliance Management, Security Management, Information Assurance, Security Controls, Program Implementation, Regulatory Compliance, Cybersecurity, Cyber Security Strategy, Business Continuity
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, LLM Application, Cybersecurity, Routing Protocols, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Intrusion Detection and Prevention, Security Controls, Threat Detection, Network Analysis, Internet Of Things, AI Integrations
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: NIST 800-53, Security Management, Continuous Monitoring, Event Monitoring, Security Controls, System Monitoring, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Policies, Vulnerability Assessments, Cyber Security Assessment, Threat Detection, Incident Response, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: ISO/IEC 27001, Threat Management, Security Management, Risk Management Framework, Data Security, Cyber Risk, Risk Management, Vulnerability Management, Continuous Monitoring, Vulnerability Assessments, Cyber Security Policies, Security Controls, Governance Risk Management and Compliance, Cybersecurity, Information Systems, Scenario Testing, Asset Protection, Continuous Improvement Process
Beginner · Course · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Audit Planning, Auditing, Information Assurance, Project Management, Security Awareness, Compliance Auditing, Internal Auditing, Generally Accepted Auditing Standards, Control Objectives for Information and Related Technology (COBIT), Risk Analysis, Risk Management, Risk Control
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Security Controls
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Security Awareness, Information Systems Security, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Information Privacy, Data Sharing, Telecommuting, Professional Development
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Information Assurance, Security Controls, Data Integrity, Identity and Access Management, Network Security, IT Security Architecture, Authentications, Cybersecurity, Authorization (Computing), Infrastructure Security, Enterprise Security, User Provisioning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Software Testing, Security Controls, System Monitoring, White-Box Testing, Threat Detection, IT General Controls (ITGC)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Cyber Security Assessment, Cryptographic Protocols, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Authorization (Computing), Information Privacy
Intermediate · Course · 1 - 4 Weeks