The language used throughout the course, in both instruction and assessments.

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Generative AI, Generative Model Architectures, System Monitoring, Data Ethics, Responsible AI, LLM Application, Cybersecurity, Artificial Intelligence, Prompt Engineering, Image Analysis, Threat Detection, Emerging Technologies, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months

EIT Digital
Skills you'll gain: Email Security, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, Data Security, Secure Coding, Human Factors (Security), Fraud detection, Entrepreneurship
Beginner · Course · 1 - 3 Months

EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Risk, Cyber Security Assessment, Network Security, Risk Management, Security Controls, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Threat Modeling, Enterprise Architecture, Cybersecurity, Application Security, Threat Management, Network Security, Systems Architecture, Identity and Access Management, Solution Architecture, Endpoint Security, Data Security, Risk Analysis, Remote Access Systems, Case Studies, Risk Management
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Detection, Identity and Access Management, Incident Response, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Threat Management, Zero Trust Network Access, MITRE ATT&CK Framework, Security Awareness, Security Information and Event Management (SIEM), Security Controls, Endpoint Security, User Accounts, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Penetration Testing, Metasploit, Safety Culture, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Generative AI, Security Testing, Vulnerability Scanning, Anomaly Detection, Data Security, Security Strategy, Network Security, Security Software, Change Management, Machine Learning Methods, Ethical Standards And Conduct, Data Visualization
Beginner · Specialization · 1 - 3 Months
Starweaver
Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, Threat Modeling, Information Systems Security, DevOps, Disaster Recovery
Beginner · Specialization · 1 - 3 Months
Gain the knowledge and skills you need to advance.

This role has a $119,168 median salary ¹.

A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.
This role has a $119,168 median salary ¹.
Offered by



This role has a $116,480 median salary ¹.

A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.
This role has a $116,480 median salary ¹.
Offered by




Build toward a degree
Professional Certificate

Build toward a degree
Professional Certificate

Build toward a degree
Course

Build toward a degree
Professional Certificate

Build toward a degree
Professional Certificate

Specialization

Build toward a degree
Professional Certificate

Multiple educators
Professional Certificate

Professional Certificate

Macquarie University
Course

EC-Council
Professional Certificate

EIT Digital
Course