
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Security Information and Event Management (SIEM), Multi-Factor Authentication, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Supervised Learning, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: AI Security, Responsible AI, Data Security, Security Strategy, Security Management, Infrastructure Security, Data Ethics, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Generative Adversarial Networks (GANs), Transfer Learning, Artificial Neural Networks, Keras (Neural Network Library), Image Analysis, Convolutional Neural Networks, PyTorch (Machine Learning Library), Deep Learning, Tensorflow, Data Preprocessing, Embeddings, Network Architecture, Matplotlib, Jupyter, NumPy
Advanced · Course · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, AI Security, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Threat Detection, Responsible AI, Artificial Intelligence, Anomaly Detection, Data Ethics, Innovation
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Preprocessing, Dimensionality Reduction, PyTorch (Machine Learning Library), Deep Learning, Keras (Neural Network Library), Tensorflow, Artificial Intelligence, Data Cleansing, Model Evaluation, Jupyter, Python Programming, Applied Machine Learning, Artificial Neural Networks, Scikit Learn (Machine Learning Library), Machine Learning, Matplotlib, Supervised Learning, Exploratory Data Analysis, Statistical Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), AI Security, Generative AI, Fraud detection, Model Evaluation, Feature Engineering, Cybersecurity, Cyber Security Strategy, Data Preprocessing, Anomaly Detection, Security Testing, Applied Machine Learning, Reinforcement Learning, Performance Tuning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Computing, Data Security, Identity and Access Management, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months