
Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity
★ 4.8 (17) · Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Social Network Analysis, Network Analysis, Graph Theory, R (Software), Social Sciences, Statistical Analysis, R Programming, Statistical Software, Sociology, Network Model, Statistical Modeling, Statistical Hypothesis Testing, Statistical Methods, Dependency Analysis
★ 4.2 (11) · Intermediate · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, TCP/IP, Network Infrastructure, Network Protocols, Firewall, Computer Security, Network Analysis, Exploitation techniques, General Networking, Authorization (Computing), Web Applications, Security Controls, Identity and Access Management, Authentications
★ 4.8 (736) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Endpoint Detection and Response, Threat Detection, Incident Response, Cloud Security, Cyber Threat Intelligence, Computer Security Incident Management, Microsoft Azure, Security Information and Event Management (SIEM), Endpoint Security, Azure Active Directory, Incident Management, Security Controls, Multi-Cloud, Anomaly Detection, Email Security, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Automation, Query Languages
Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Exploitation techniques, Cyber Operations, Cybersecurity, Malware Protection, Cyber Attacks, Data Security, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Security Controls, Cyber Attacks, Incident Response, Digital Forensics, Risk Management Framework, Exploitation techniques, Network Security, Threat Management, Computer Security Incident Management, Network Monitoring, Event Monitoring, Network Analysis, Firewall, Data Integrity
★ 5 (22) · Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Mobile Security, Digital Forensics, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage
★ 4.6 (14) · Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Data Management, Infrastructure as Code (IaC), Enterprise Security, Zero Trust Network Access, Application Security, Infrastructure Security, Security Controls, Threat Management, Security Requirements Analysis, Data Quality, Compliance Management, Identity and Access Management
Intermediate · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Authentications, Arithmetic, Algorithms, Brute-force attacks, Applied Mathematics, Data Integrity, Probability, Computer Science
★ 4.6 (1K) · Beginner · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Cybersecurity, Network Security, Cryptographic Protocols, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Security Controls, Event Monitoring, Continuous Monitoring, Threat Detection, Data Integrity
★ 4.8 (63) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, IT Security Architecture, Cyber Security Strategy, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
★ 4.3 (9) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks