
Skills you'll gain: Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Microsoft Azure, Cloud Security, Virtual Private Networks (VPN), Network Security, Vulnerability Assessments, Continuous Monitoring, Data Security, Key Management, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Network Administration, Network Routing, System Monitoring, Remote Access Systems, User Accounts, Authorization (Computing)
Advanced · Specialization · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: JavaScript Frameworks, Web Development Tools, Test Automation, API Testing, Test Tools, Software Testing, Network Performance Management, Web Servers
Advanced · Guided Project · Less Than 2 Hours

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, White-Box Testing, Secure Coding, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, User Accounts, Data Validation, Debugging, Cryptography, C (Programming Language), File Management, OS Process Management
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Network Protocols, Data Ethics, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: SAS (Software), Network Analysis, Text Mining, Spatial Analysis, Data Visualization, Data Manipulation, Data Analysis, Exploratory Data Analysis, Statistical Programming, Data Preprocessing
Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, Threat Detection, Security Controls, Security Testing, Application Development, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Infrastructure as Code (IaC), Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Security Requirements Analysis, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Enterprise Architecture, Data Integrity
Beginner · Course · 1 - 4 Weeks