
Skills you'll gain: Model Evaluation, Model Deployment, MLOps (Machine Learning Operations), Transfer Learning, Image Analysis, Computer Vision, Performance Metric, Tensorflow, Performance Measurement, Data Cleansing, Data Transformation, Performance Analysis, Data Quality, Failure Analysis, Data Pipelines, Deep Learning, PyTorch (Machine Learning Library), Applied Machine Learning, Docker (Software), Python Programming
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Virtualization, Computer Architecture, Excel Macros, Linux
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, IT Security Architecture, Cloud Security, Cyber Risk, Intrusion Detection and Prevention, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Email Security, Risk Management
Beginner · Specialization · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Policies, Mobile Development, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Computer Security, Application Security, Machine Learning Methods, Digital Assets
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Data Security, Security Testing, Data Ethics, Cyber Security Strategy, Cyber Threat Intelligence, Security Controls, Cyber Risk, Data Sharing, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Cyber Threat Hunting, Cyber Governance, Security Management, Artificial Intelligence and Machine Learning (AI/ML), Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI
Beginner · Specialization · 3 - 6 Months