
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Continuous Monitoring, Patch Management, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming
Advanced · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Virtual Networking, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, Cybersecurity, Cyber Governance, Data Security, Cyber Security Policies, Computer Security, Digital Assets, Security Testing, Cyber Risk, Incident Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Cyber Threat Intelligence, Digital Forensics, Computer Security Incident Management, Threat Detection, Cybersecurity, Mobile Security, Network Analysis
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: AI Security, Responsible AI, DevSecOps, Cryptography, Network Security, Secure Coding, Application Security, Encryption, IT Security Architecture, Advanced Encryption Standard (AES), Cybersecurity, Cyber Security Strategy, Key Management, CI/CD, Cloud Security, Software Development, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Controls, Software Architecture
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Risk Management Framework, Cyber Security Strategy, Cyber Threat Intelligence, Threat Modeling, Security Strategy, Security Awareness, Cybersecurity, Security Engineering, IT Security Architecture, Zero Trust Network Access, Threat Management, Human Factors (Security), Security Controls, Threat Detection, Network Security, Information Systems Security, Incident Response, Enterprise Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks