
Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Oral Expression, Verbal Communication Skills, Incident Response, Risk Analysis, Communication, Infrastructure Security, Analysis, Stakeholder Communications
Intermediate · Course · 1 - 3 Months
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Strategy
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Anomaly Detection, Command-Line Interface
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, Network Security
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Security Information and Event Management (SIEM), Prompt Engineering, ChatGPT, AI Workflows, Agentic Workflows, Cyber Threat Intelligence, Incident Response, AI Security, Generative AI Agents, AI Integrations, Vulnerability Assessments, Vulnerability Scanning, Cloud Security, Threat Detection, Continuous Monitoring, Microsoft Azure, Event Monitoring, OpenAI, Incident Management, Code Review
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AI literacy, Cybersecurity, Computer Security Awareness Training, AI Personalization, Incident Response, Mitigation
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Mobile Security, AI Security, Exploitation techniques, Threat Detection, Security Controls, Intrusion Detection and Prevention, Threat Modeling, Hardening, AI literacy, Malware Protection, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Prompt Engineering, Human Factors (Security), Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Responsible AI, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Penetration Testing, IT Security Architecture, Cyber Risk, Data Loss Prevention, Vulnerability Assessments, Exploitation techniques, Data Security, Incident Response, Tensorflow
Intermediate · Course · 1 - 4 Weeks