
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Cyber Attacks, Security Controls, Risk Management
Beginner · Specialization · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Microsoft Servers, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months
Skills you'll gain: Anomaly Detection, Microsoft Azure, Event Monitoring, Application Performance Management, Time Series Analysis and Forecasting, Generative AI, Query Languages, Data Integration, Process Optimization, Data Analysis, User Feedback
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Mobile Security, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Mobile Development, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Android (Operating System), Application Security, Computer Security, Legal Proceedings, Machine Learning Methods
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, System Monitoring, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Threat Hunting, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Detection, Malware Protection, Cyber Attacks, Cyber Engineering
Intermediate · Course · 1 - 4 Weeks