
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Cyber Security Strategy, MITRE ATT&CK Framework, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, Cloud Services, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Cloud Platforms, Disaster Recovery, Cloud Computing Architecture, Cloud Applications, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Risk Management
★ 4.7 (33) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Attacks, Cyber Security Policies, Regulatory Requirements, Cyber Security Assessment, Financial Industry Regulatory Authorities, Continuous Monitoring, Regulatory Compliance, Governance Risk Management and Compliance, Risk Analysis, Data Ethics, Emerging Technologies, Cloud Security, AI Security, Blockchain
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
★ 4.7 (59) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, IT Security Architecture, Security Architecture Review, Network Security, Cyber Security Strategy, Data Security, Security Controls, Threat Management, Security Strategy, Vulnerability Management, Incident Response, Vulnerability Assessments, Data Integrity, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Management
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
★ 4.8 (199) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Virtual Machines, Debugging, System Programming, Windows PowerShell, Virtual Environment, Virtualization, Programming Principles, Excel Macros, Linux
★ 4.5 (86) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Vulnerability Scanning, Business Continuity Planning, Business Continuity, Risk Analysis, Risk Management Framework, Threat Management, Vulnerability Management, Cyber Security Assessment, Cyber Risk, Risk Management, Contingency Planning, Business Risk Management, Risk Mitigation
★ 5 (6) · Intermediate · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Intrusion Detection and Prevention, Event Monitoring, Computer Security Incident Management, Malware Protection, Network Analysis, Anomaly Detection, Network Security, Network Monitoring, Network Protocols
★ 4.9 (34) · Mixed · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Hardening, Computer Security, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Security Architecture Review, Application Specific Integrated Circuits, Cryptographic Protocols, Microarchitecture, Cryptography, Systems Design, Encryption, Exploitation techniques, Functional Design, Emerging Technologies
★ 4.3 (693) · Mixed · Course · 1 - 3 Months