
Macquarie University
Skills you'll gain: Risk Management Framework, Persuasive Communication, Storytelling, Influencing, Governance, Risk Management, Change Management, Organizational Change, Communication, Conflict Management, Leadership, Business Transformation, Risk Analysis, Negotiation, Operational Risk, Business Risk Management, Risk Mitigation, Intercultural Competence, Stakeholder Management, Process Management
Beginner · Specialization · 3 - 6 Months

Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

West Virginia University
Skills you'll gain: Sales Management, Sales Strategy, Account Management, Sales, Sales Process, Sales Training, Inside Sales, Selling Techniques, Business Strategy, Outside Sales, Recruitment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Vanderbilt University
Skills you'll gain: Prompt Engineering, AI Security, ChatGPT, Prompt Patterns, Generative AI, Crisis Management, LLM Application, Productivity, Incident Response, Responsible AI, OpenAI, AI Personalization, AI Enablement, Data Ethics, Artificial Intelligence, Large Language Modeling, Business Ethics, Information Privacy, Threat Modeling, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, OSI Models, Cryptography, Encryption, Endpoint Security, Firewall, Malware Protection, Wireless Networks, Network Protocols, Public Key Infrastructure, Data Integrity, Virtualization
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Microsoft Azure, Threat Modeling, Cloud Security, Continuous Monitoring, System Monitoring, Security Information and Event Management (SIEM), Security Management, Threat Detection, Threat Management, Application Performance Management, Event Monitoring, Vulnerability Management, Brute-force attacks, Incident Response, Query Languages
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Behavior Management, Insurance
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), AI Security, Generative AI, Fraud detection, Model Evaluation, Feature Engineering, Cybersecurity, Cyber Security Strategy, Data Preprocessing, Anomaly Detection, Security Testing, Applied Machine Learning, Reinforcement Learning, Performance Tuning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Public Key Infrastructure, Network Monitoring, Encryption, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches, Authentications
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months