The language used throughout the course, in both instruction and assessments.

Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Beginner · Course · 1 - 3 Months

Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Modeling, Zero Trust Network Access, Security Management, DevSecOps, Identity and Access Management, Application Security, Cybersecurity, Data Security, Microsoft Azure, Cyber Security Strategy, Security Strategy, IT Security Architecture, Cloud Security, Azure Active Directory
Advanced · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: DevSecOps, DevOps, Application Security, Secure Coding, Security Testing, Continuous Delivery, CI/CD, Security Engineering, Continuous Integration, Threat Modeling, Containerization, Continuous Monitoring, Infrastructure as Code (IaC), Automation
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Firewall, Network Security, Cloud Security, Threat Modeling, Cloud Management, Network Monitoring
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Security Controls, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Management, Cloud Security, Application Security, Cloud Computing, Cloud Infrastructure, Cloud Applications, IT Security Architecture, Identity and Access Management, Data Integrity, Secure Coding, Private Cloud, Security Awareness, Data Centers, Data Management, Personally Identifiable Information, Threat Modeling, Security Testing, Security Controls, General Data Protection Regulation (GDPR), Service Level
Advanced · Specialization · 1 - 3 Months