
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Vulnerability Assessments, Vulnerability Management, Application Security, Security Controls, Security Testing, Authentications, Threat Management, Dependency Analysis, Application Programming Interface (API), API Design, Risk Analysis, Data Validation, Supply Chain
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Vulnerability Assessments, Network Security, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, Threat Detection, Network Analysis, Continuous Monitoring, Security Strategy, Internet Of Things, Emerging Technologies, General Networking, Network Architecture, Enterprise Architecture, Infrastructure Architecture, Virtualization
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Attacks, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Exploitation techniques, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Security Requirements Analysis, Cyber Risk, Human Factors (Security), Application Servers, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Open Web Application Security Project (OWASP), Vulnerability Assessments, Cyber Security Assessment, AI Security, Generative AI, Responsible AI, Prompt Engineering
Beginner · Course · 1 - 4 Weeks