
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Threat Modeling, Security Engineering, Security Testing, Hardening, Security Controls, Security Strategy, Penetration Testing, Data Validation, Model Evaluation, Information Privacy, Generative Adversarial Networks (GANs), Analysis, Design
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Vulnerability Assessments, System Design and Implementation, Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Incident Response, LLM Application, Hardening, Application Security, Anomaly Detection, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Process Optimization, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Machine Learning Methods
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Protocols
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Threat Modeling, Security Engineering, Network Security, Firewall, Digital Forensics, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things, Servers
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Information Assurance, Data Security, Public Key Cryptography Standards (PKCS)
Intermediate · Course · 1 - 4 Weeks