
Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

Logical Operations
Skills you'll gain: Network Troubleshooting, Network Security, Network Administration, Remote Access Systems, Software-Defined Networking, Computer Networking, IT Automation, Virtual Private Networks (VPN), Infrastructure Security, Wireless Networks, General Networking, Network Architecture, Virtual Local Area Network (VLAN), Network Protocols, Hardware Troubleshooting, Network Switches, TCP/IP, Automation
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, Ethical Standards And Conduct, Encryption
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Macquarie University
Skills you'll gain: Digital Forensics, Mobile Security, Intrusion Detection and Prevention, Criminal Investigation and Forensics, Cyber Security Strategy, Investigation, Cyber Threat Intelligence, Cyber Attacks, File Systems, Mobile Development, Cybersecurity, Threat Modeling, Cyber Security Policies, Apple iOS, Data Security, Android (Operating System), Artificial Intelligence and Machine Learning (AI/ML), Application Security, Data Integrity, Legal Proceedings
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Malware Protection, Cybersecurity, Data Persistence, Network Analysis, Operating Systems, Virtual Environment
Beginner · Course · 1 - 4 Weeks