
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Endpoint Detection and Response, Vulnerability Assessments
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Threat Hunting, Cyber Security Strategy, Information Systems Security, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, Threat Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

CertNexus
Skills you'll gain: Threat Modeling, Cybersecurity, Cyber Threat Intelligence, Threat Management, Information Systems Security, Threat Detection, Security Management, Cyber Risk, Security Strategy, Cyber Security Strategy, Risk Analysis, Computer Security, Risk Mitigation, Risk Management, Network Security, Risk Management Framework, Enterprise Risk Management (ERM), Risk Appetite, Trend Analysis, Technical Documentation
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Regulatory Compliance, Risk Analysis, Data Ethics, Emerging Technologies, Cloud Security, AI Security, Blockchain
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Continuous Monitoring, Patch Management, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Open Web Application Security Project (OWASP), Responsible AI, Threat Modeling, Vulnerability Scanning, AI Personalization, Continuous Integration, Code Review, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis
Intermediate · Course · 3 - 6 Months