
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Mobile Security, Cybersecurity, Penetration Testing, Cloud Security, Malware Protection, Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Security Testing, Cyber Security Assessment, Information Systems Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Operating System Administration, Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Network Security, Networking Hardware, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning
Intermediate · Specialization · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cybersecurity, Malware Protection, Data Loss Prevention, Cyber Attacks, Data Security, Encryption, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
Mixed · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity
Beginner · Specialization · 3 - 6 Months