
Board Infinity
Skills you'll gain: Risk Management Framework, Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Cyber Risk, Business Continuity, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Incident Management, Operational Risk, Business Risk Management
★ 4.8 (13) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Ansible, Red Hat Enterprise Linux, Linux Administration, Hardening, Linux Commands, Linux, Linux Servers, Security Controls, Authorization (Computing), Containerization, Computer Security, System Configuration, Identity and Access Management, Context Management
Intermediate · Course · 1 - 3 Months

John Wiley & Sons
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Security Testing, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Risk Management, Information Systems Security, Vulnerability Scanning, Vulnerability Assessments, Security Controls, Penetration Testing, Incident Response, Vendor Management
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
★ 4.4 (25) · Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Hardening, Incident Response, Computer Security Incident Management, Single Sign-On (SSO), Threat Management, Security Management, Security Controls, Continuous Monitoring, User Provisioning, Threat Detection, Enterprise Security, Event Monitoring, Identity and Access Management, Enterprise Application Management, IT Automation, Authentications
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Requirements Elicitation, Software Design Documents, Requirements Analysis, Mockups, Security Requirements Analysis, Interviewing Skills, User Requirements Documents, Systems Development Life Cycle, Data Flow Diagrams (DFDs), Storyboarding, Functional Requirement, Goal Setting, Software Development Methodologies, Software Documentation, Diagram Design, Agile Methodology, Product Requirements, Unified Modeling Language, Risk Management Framework, Risking
★ 4.5 (857) · Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
★ 4.8 (199) · Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Model Training, Threat Modeling, Machine Learning Methods, Python Programming
★ 4.9 (7) · Intermediate · Course · 1 - 3 Months
Microsoft
Skills you'll gain: Prompt Engineering, Prompt Engineering Tools, Prompt Patterns, Microsoft Copilot, AI Integrations, AI Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Threat Detection, Generative AI
★ 4.8 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Application Security, Security Testing, Risk Management Framework, Systems Development Life Cycle, Secure Coding, Threat Modeling, Software Testing, Software Development, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Development Testing, Software Development Methodologies, Application Programming Interface (API), Code Reusability, Databases, Agile Methodology, Exploitation techniques, Data Validation
★ 4.9 (18) · Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Exploitation techniques, Brute-force attacks, Scripting, Network Protocols, Authentications, Scripting Languages, Python Programming, Data Access, Identity and Access Management, Automation
★ 4.5 (80) · Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Vulnerability Management, Security Testing, Security Management, Simulations, Configuration Management, Cybersecurity, Cloud Security
Intermediate · Course · 1 - 3 Months