
Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Data Visualization, Data Presentation, AI Security, Interactive Data Visualization, A/B Testing, Threat Management, Open Web Application Security Project (OWASP), Secure Coding, Application Security, Responsible AI, System Monitoring, MLOps (Machine Learning Operations), Analytics, Data Governance, Application Programming Interface (API), Vulnerability Assessments, Cyber Governance, Data Processing, Data Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Process Modeling, Process Mapping, Business Process Modeling, Process Analysis, Business Analysis, Data Storytelling, Business Analysis Tools, Business Process Improvement, Feasibility Studies, Systems Analysis, Stakeholder Analysis, Process Optimization, Requirements Management, Business Systems Analysis, Systems Design, Communication Planning, Test Planning, Information Technology, Database Management, Agile Methodology
★ 4.7 (4.8K) · Beginner · Professional Certificate · 3 - 6 Months

SkillUp
Skills you'll gain: Systems Design, Business Process Modeling, Data Flow Diagrams (DFDs), Systems Analysis, Data Modeling, Process Modeling, Business Systems Analysis, Digital Transformation, Enterprise Modeling, Business Process, Risk Management, Systems Architecture, Business Analysis, Information Technology, Process Flow Diagrams, Prototyping, Computer Science, Agile Methodology, Product Lifecycle Management, Business Communication
★ 4.7 (25) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months
Illinois Tech
Skills you'll gain: Operating System Administration, Linux Administration, Microsoft Windows, Command-Line Interface, Operating Systems, System Configuration, Event Monitoring, Authorization (Computing), Desktop Support, OS Process Management, Network Security, Information Technology, IT Automation, Network Administration, General Networking
★ 4.6 (166) · Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (599) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Incident Management, Network Security, Authentications, Mobile Security, OSI Models, Security Controls, Configuration Management, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Security Awareness
★ 4.7 (4.5K) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications
★ 4.5 (20) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
★ 4.7 (251) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cryptography, Cyber Security Strategy, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cybersecurity, IT Security Architecture, Encryption, Information Systems Security, Vulnerability Assessments, Cyber Attacks, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
★ 4.7 (59) · Intermediate · Specialization · 3 - 6 Months