
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Continuous Improvement Process
Beginner · Course · 1 - 3 Months

DeepLearning.AI
Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, AI Security, Application Security, Risk Management Framework
Beginner · Project · Less Than 2 Hours

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, System Monitoring, Systems Analysis
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Virtual Machines, Encryption, Event Management
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Kubernetes, Cloud Security, Cloud Applications, Generative AI, Cloud Storage, Encryption, OAuth, Security Controls, Virtual Machines, Network Infrastructure, Cloud Computing, Authorization (Computing), Threat Management, Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Security Controls, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Identity and Access Management, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation
Beginner · Course · 1 - 3 Months