
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Management, Network Analysis, AI Security, Network Security, Network Monitoring, NIST 800-53, Network Protocols, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Continuous Monitoring, Patch Management, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Security Controls, Security Testing, Containerization, Software Development, CI/CD, Cybersecurity, Vulnerability Management, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Systems Development Life Cycle, Software Development Life Cycle, Systems Development, Software Development Methodologies, Change Management, Project Management, System Implementation, Compliance Auditing, Software Testing, Auditing, Development Testing, Information Technology, Verification And Validation, Project Management Office (PMO), Internal Controls, Governance, Agile Methodology, Software Development, Data Integrity, Risk Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Business Continuity, Risk Analysis, Vulnerability Management, Cyber Security Assessment, Risk Management, Business Risk Management, Risk Mitigation, Threat Detection, Disaster Recovery, Business Analysis
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Cryptography, Key Management, Threat Modeling, Authorization (Computing), Encryption, Email Security, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Cybersecurity, Cyber Threat Intelligence, Security Controls, Threat Modeling, Incident Response, Digital Forensics, Risk Management Framework, Network Security, Data Security, Network Analysis, Firewall
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, DevSecOps, Security Testing, Software Development Methodologies, Configuration Management, Software Development, Software Configuration Management, Software Development Life Cycle, Software Testing, API Testing, Threat Modeling, Application Programming Interface (API), Cloud Security, Risk Management Framework, Change Control
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks