
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
Beginner · Course · 1 - 3 Months

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
Beginner · Course · 1 - 4 Weeks

EIT Digital
Skills you'll gain: Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, Data Ethics, International Relations, Cybersecurity, World History, European History, Research, Political Sciences
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Technical University of Munich (TUM)
Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Aerospace Basic Quality System Standards, Manufacturing Processes, Big Data, Production Process, Cybersecurity, Spatial Data Analysis, Artificial Intelligence, Threat Detection, Automation, Telecommunications, Technology Strategies, Cloud Computing, Data Storage
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cloud Security, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy, Wireless Networks, Application Programming Interface (API), Security Controls
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Security Awareness, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Culture Transformation, Cyber Security Policies, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Disaster Recovery, Cybersecurity, Cyber Risk, Cyber Operations, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Calculus, Integral Calculus, Applied Mathematics, Graphing, Numerical Analysis, Python Programming, Advanced Mathematics, Mathematical Software, Mathematical Modeling, Derivatives, Programming Principles
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Anomaly Detection, Cybersecurity, Security Controls, Data Analysis Software, Risk Management Framework, Configuration Management
Beginner · Course · 1 - 4 Weeks