
Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Network Security, Key Management, Public Key Cryptography Standards (PKCS), Encryption, Cyber Risk, Data Integrity, Distributed Computing, Transaction Processing, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Network Security, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, General Data Protection Regulation (GDPR), Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Cybersecurity, Enterprise Application Management, Cyber Attacks, Emerging Technologies, Financial Trading, Digital Assets, Cyber Security Assessment, FinTech, Transaction Processing, Data Integrity
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Model Evaluation, Exploratory Data Analysis, Event-Driven Programming, Encryption, Server Side, Web Development, Regression Analysis, Apache, Web Services, Machine Learning Algorithms, Classification Algorithms, Data Preprocessing, Public Key Cryptography Standards (PKCS), Web Scraping, Natural Language Processing, Web Applications, Key Management, Python Programming, Predictive Modeling
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Digital Forensics, Risk Management, Incident Response, Threat Management, Risk Analysis, Business Risk Management, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Application Security, ISO/IEC 27001, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection, Compliance Management, Governance
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, IT Security Architecture, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: AI Security, Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Information Systems Security, Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Threat Detection, Artificial Intelligence, Model Deployment, Machine Learning, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks