
Skills you'll gain: File Management, Computer Literacy, Microsoft Office, Email Security, Computer Hardware, Computer Security Awareness Training, Spreadsheet Software, Information Management, Safety and Security, Cybersecurity
Intermediate · Course · 1 - 4 Weeks

Institut Mines-Télécom
Skills you'll gain: Cybersecurity, Open Web Application Security Project (OWASP), Application Security, Cyber Attacks, Threat Modeling, Risk Management Framework, Secure Coding, Vulnerability Assessments, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Embedded Systems, Embedded Software, Computer Systems, Internet Of Things, System Programming, C (Programming Language), Hardware Architecture, Peripheral Devices, Wireless Networks, Computer Architecture, Cybersecurity, Cloud Computing, Development Environment, Debugging
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Universidades Anáhuac
Skills you'll gain: Internet Of Things, Robotic Process Automation, Automation, Petroleum Industry, Data Ethics, Manufacturing and Production, Oil and Gas, Artificial Intelligence, Big Data, Data Processing, Data Capture, Cybersecurity
Beginner · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security
Intermediate · Specialization · 1 - 3 Months

University of California San Diego
Skills you'll gain: Pedagogy, Blockchain, Data Ethics, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Instructional Strategies, Computer Security Awareness Training, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks