Cybersecurity courses can help you learn network security, risk management, encryption techniques, and incident response strategies. You can build skills in threat analysis, vulnerability assessment, and implementing security protocols to protect sensitive information. Many courses introduce tools like firewalls, intrusion detection systems, and security information and event management (SIEM) software, showing how these tools support the skills needed to safeguard digital environments.

Skills you'll gain: Threat Detection, Cyber Threat Intelligence, Threat Management, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Cybersecurity, Security Strategy, Risk Mitigation, Emergency Response, Network Analysis, Technical Writing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Security Management, ISO/IEC 27001, Security Controls, Information Systems Security, Risk Management, Risk Analysis, Security Strategy, Cyber Governance, Threat Modeling, NIST 800-53, Compliance Management, Regulatory Requirements
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Continuous Monitoring, Medical Privacy, Personally Identifiable Information, Risk Management, Health Information Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Regulatory Compliance, Data Management, Information Privacy, Health Care Procedure and Regulation, Risk Mitigation, Security Management, Risk Analysis, Health Care, Patient Safety, Security Awareness, Data Security, Cybersecurity, Information Systems Security, Security Controls
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Hunting, Mobile Security, Cyber Operations, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Technical Communication, Simulations
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Generative AI, Google Cloud Platform, Cybersecurity, Cloud Security, Artificial Intelligence, Technical Communication
Beginner · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Big Data, Cybersecurity, Pedagogy, Data Security, Cryptography, Information Privacy, Encryption, Responsible AI, AI Personalization, Computer Science, Information Technology, Web Applications, Web Servers, Machine Learning, Supervised Learning
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Supervised Learning, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks