The language used throughout the course, in both instruction and assessments.

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Coursera Instructor Network
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Risk Analysis, Asset Management
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Cyber Attacks, Threat Detection, Threat Modeling, Malware Protection, SQL, Network Security, Vulnerability Assessments, Databases, Data Security, Email Security
Beginner · Course · 1 - 4 Weeks

Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Threat Modeling, Incident Response, Cyber Governance, Cyber Security Strategy, Threat Management, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Cyber Security Assessment, Cyber Threat Intelligence, Threat Detection, Leadership, Compliance Management, Leadership and Management, Governance, Risk Management, ISO/IEC 27001, NIST 800-53, Resilience
Beginner · Course · 1 - 3 Months

Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Authentications, Cyber Risk, Information Systems Security, Data Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Build toward a degree
Professional Certificate

Build toward a degree
Course

Specialization

Specialization

Build toward a degree
Professional Certificate

Build toward a degree
Course

Specialization

Specialization

Macquarie University
Specialization

Specialization

Macquarie University
Specialization

Macquarie University
Specialization