
Skills you'll gain: AI Security, Threat Modeling, Threat Management, LLM Application, MITRE ATT&CK Framework, LangChain, Threat Detection, Large Language Modeling, Continuous Monitoring, Event Monitoring, Security Testing, Cyber Threat Intelligence, Generative AI, Embeddings, LangGraph, Prompt Engineering, Vector Databases
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Prompt Engineering, Prompt Patterns, Responsible AI, Data Ethics, AI literacy, Case Studies, Generative AI, Ethical Standards And Conduct, Artificial Intelligence, Business Ethics
★ 4.6 (25) · Beginner · Course · 1 - 4 Weeks

28DIGITAL
Skills you'll gain: Cybersecurity, Cyber Attacks, AI Security, Network Security, Information Systems Security, Data Ethics, Deep Learning, Responsible AI, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Machine Learning Methods, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Responsible AI, Model Training, Data Ethics, Deep Learning, Model Deployment, Debugging, Artificial Intelligence, Bayesian Network, Machine Learning Methods, Ethical Standards And Conduct, Model Evaluation, Bayesian Statistics, Artificial Neural Networks
★ 4.5 (11) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.8 (20) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Security Testing, Vulnerability Scanning, TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence
★ 5 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, AI Security, DevSecOps, Security Testing, Continuous Monitoring, CI/CD, Threat Detection, DevOps, Continuous Integration, Test Script Development, API Testing, Endpoint Security, Scripting, Unit Testing, Scripting Languages, Exploitation techniques, Integration Testing, Data Validation
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks