
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Intermediate · Course · 1 - 3 Months
Skills you'll gain: AI Security, Threat Modeling, MITRE ATT&CK Framework, Application Security, Security Engineering, Security Controls, Responsible AI, MLOps (Machine Learning Operations), Cybersecurity, Model Deployment, Data Security, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Application Lifecycle Management
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Mobile Security, AI Security, Threat Detection, Security Controls, Exploit development, Threat Modeling, Hardening, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Deep Learning, Prompt Engineering, Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Infrastructure Security, Data Security, Information Systems Security, Internet Of Things, Threat Modeling, Cybersecurity, Cloud Security, Security Engineering, Cryptography, Secure Coding, Network Security, Cyber Risk, Cyber Attacks, Mobile Security, Vulnerability, Vulnerability Scanning, Cloud Services, Web Applications, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Security Management, Network Security, Network Monitoring, Splunk, Network Analysis, Technical Documentation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Responsive Web Design, Cascading Style Sheets (CSS), Web Development, Javascript, Bootstrap (Front-End Framework), Scripting, Browser Compatibility, Application Programming Interface (API), Back-End Web Development
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Anomaly Detection, AI Security, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: User Story, New Product Development, Real-Time Operating Systems, Model Based Systems Engineering, Model Evaluation, Field-Programmable Gate Array (FPGA), Failure Analysis, Sustainable Business, Data Mining, Delegation Skills, Object Oriented Design, Sampling (Statistics), Proposal Writing, Supplier Management, Accountability, Data Ethics, Prompt Engineering, Sustainability Reporting, Database Design, Unsupervised Learning
Earn a degree
Degree · 1 - 4 Years

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Northeastern University
Skills you'll gain: Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM), Incident Response, Identity and Access Management, Cybersecurity, Network Security, Authentications, Application Security, Authorization (Computing), Role-Based Access Control (RBAC), DevSecOps, Vulnerability Assessments, Infrastructure Security, Vulnerability Management, Security Strategy, Security Controls, Penetration Testing, Firewall, Zero Trust Network Access
Mixed · Course · 1 - 3 Months