
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Patch Management, Cyber Risk, Continuous Monitoring, Threat Detection, Cyber Threat Hunting, Application Security, Security Controls, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Network Security, Cyber Security Strategy, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Digital Forensics, Security Controls, Multi-Factor Authentication, Human Factors (Security)
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Security Awareness, Enterprise Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Digital Forensics, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Threat Management, Exploit development, Cyber Security Strategy, Cyber Attacks, Cybersecurity, Cyber Security Policies, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Endpoint Detection and Response, Intrusion Detection and Prevention, Threat Detection, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Event Monitoring, Cyber Attacks, Cyber Security Assessment, Continuous Monitoring, Security Management, Malware Protection, Cyber Engineering, Security Testing, Cyber Governance, Linux
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Risk Analysis, Communication, Malware Protection, Application Security, Infrastructure Security, Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Embedded Software, Application Security, Embedded Systems, Software Design, DevSecOps, Internet Of Things, Application Deployment, Systems Design, User Interface and User Experience (UI/UX) Design, System Design and Implementation, Cybersecurity, IT Security Architecture, Development Environment, Cyber Security Strategy, Design Strategies, Software Architecture, Functional Design, Functional Testing, Open Source Technology
Beginner · Course · 3 - 6 Months

Skills you'll gain: Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Cybersecurity, Interactive Data Visualization, Geospatial Information and Technology, Web Scraping, Digital Forensics, IT Automation, Data Security, Security Awareness, Personally Identifiable Information, Network Security, Scripting, Network Analysis, Open Source Technology, Data Analysis Software, Information Privacy
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Information Management, Business Ethics, Performance Measurement, Compliance Management, Governance, Business Planning, Organizational Strategy
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Event Monitoring, Vulnerability Management, Vulnerability, Continuous Monitoring, Data Security, Network Security, Analysis, Criminal Investigation and Forensics, System Monitoring, System Configuration, Network Monitoring, Bash (Scripting Language), Scripting, Linux, Python Programming
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Security Management, Incident Management, Cyber Risk, Regulatory Compliance, Compliance Management, Information Systems Security, Cyber Security Strategy, Cybersecurity, Enterprise Security, Federal Information Security Management Act, Law, Regulation, and Compliance, Regulation and Legal Compliance, Payment Card Industry (PCI) Data Security Standards, Computer Security, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Network Security, Sarbanes Oxley Act (SOX) Compliance, General Data Protection Regulation (GDPR)
Mixed · Course · 1 - 3 Months