
Skills you'll gain: Threat Modeling, Cloud Security, Internet Of Things, Infrastructure Security, Vulnerability Management, Information Systems Security, Incident Response, Identity and Access Management, Security Engineering, Threat Management, Penetration Testing, Network Security, Security Controls, Cloud Computing, Cloud Computing Architecture, Threat Detection, Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Zero Trust Network Access, Cybersecurity, Threat Modeling, Network Security, Infrastructure Security, Threat Detection, Mobile Security, Disaster Recovery, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Attacks, Threat Detection, Responsible AI, Artificial Intelligence, Anomaly Detection, Innovation
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Security Management, Data Security, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Incident Response, Continuous Monitoring, Human Factors (Security), General Data Protection Regulation (GDPR), Information Privacy, System Implementation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Computer Security Awareness Training, Cybersecurity, Security Awareness, Data Security, Network Security, Human Factors (Security), Personally Identifiable Information, Email Security, Wireless Networks, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Knowledge of Apple Software, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Mobile Development Tools, Performance Testing
Advanced · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Vanderbilt University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Security Controls, Cybersecurity, Law, Regulation, and Compliance, Prompt Engineering, Public Affairs, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months