
Skills you'll gain: Hardening, Incident Response, Vulnerability Assessments, Cyber Security Assessment, Security Strategy, Security Controls, Computer Security Incident Management, Infrastructure Security, Security Testing, Control Systems, Information Systems Security, Penetration Testing, Cyber Security Strategy, Cyber Attacks, Risk Analysis, Operational Risk, Data Security, Risk Management Framework, Risk Management, Operational Databases
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Incident Response, Threat Modeling, Cyber Governance, Computer Security Incident Management, Cyber Security Strategy, Cyber Attacks, Security Management, Threat Management, Cyber Risk, Cyber Security Policies, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Governance Risk Management and Compliance, Cyber Security Assessment, Cyber Operations, Compliance Management, Governance, Risk Management, Risk Control
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Incident Response, Incident Management, Cyber Governance, Computer Security Incident Management, Security Awareness, Cyber Security Strategy, Law, Regulation, and Compliance, Cyber Attacks, Security Management, Security Strategy, Culture Transformation, Cyber Security Policies, Cyber Threat Intelligence, Intrusion Detection and Prevention, Mobile Security, Threat Detection, Cybersecurity, Cyber Risk, Cyber Operations, Cyber Security Assessment
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Patch Management, Cyber Risk, Continuous Monitoring, Threat Detection, Cyber Threat Hunting, Application Security, Security Controls, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Network Security, Cyber Security Strategy, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, IT Management, Cybersecurity, Information Systems Security, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Information Assurance, Key Performance Indicators (KPIs), Leadership and Management, Leadership, Technical Communication
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Compliance Management, Internal Controls, Threat Detection, Governance, Continuous Monitoring, Data Management, Disaster Recovery, Key Performance Indicators (KPIs), Regulatory Requirements, Business Analysis, Organizational Structure, Accountability, Stakeholder Communications
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Security Engineering, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Threat Management, Cybersecurity, Security Strategy, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions
Intermediate · Specialization · 1 - 3 Months