
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering Tools, Security Software, Systems Design, Software Engineering, Software Development Life Cycle, Technical Design
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Malware Protection, Email Security, Exploitation techniques, Network Security, Fraud detection, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Social Network Analysis, Network Analysis, Graph Theory, Social Sciences, Statistical Analysis, R Programming, Sociology, Statistical Modeling, Statistical Hypothesis Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
Beginner · Specialization · 1 - 3 Months