
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, AWS Identity and Access Management (IAM), Encryption, Personally Identifiable Information, Data Security, Authentications, Threat Detection, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Scenario Testing, Virtual Machines, Event Management
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Encryption, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
Beginner · Specialization · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
Beginner · Course · 1 - 4 Weeks