
Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Intrusion Detection and Prevention, Criminal Investigation and Forensics, Cyber Security Strategy, Investigation, Cyber Threat Intelligence, Cyber Attacks, File Systems, Mobile Development, Cybersecurity, Threat Modeling, Cyber Security Policies, Apple iOS, Data Security, Android (Operating System), Artificial Intelligence and Machine Learning (AI/ML), Application Security, Data Integrity, Legal Proceedings
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages
Beginner · Course · 1 - 4 Weeks
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Threat Modeling, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, Cyber Attacks, Hardening, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Anomaly Detection, MLOps (Machine Learning Operations), Event Monitoring, Continuous Monitoring, System Monitoring, Unsupervised Learning, Threat Detection, Statistical Analysis, Exploratory Data Analysis, Trend Analysis, Real Time Data, Statistical Methods, Performance Tuning, Time Series Analysis and Forecasting
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Anomaly Detection, Microsoft Azure, Event Monitoring, Application Performance Management, Time Series Analysis and Forecasting, Generative AI, Query Languages, Data Integration, Process Optimization, Data Analysis, User Feedback
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months