
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, General Data Protection Regulation (GDPR), Responsible AI
Beginner · Course · 1 - 4 Weeks

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, System Configuration, Digital Forensics, Virtualization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Business Continuity, Cryptography, Responsible AI, DevOps, Disaster Recovery
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Intermediate · Course · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Security Controls, Information Systems Security Assessment Framework (ISSAF), Computer Security, Security Strategy, Cyber Risk, Security Information and Event Management (SIEM), Data Ethics, Network Analysis, Personally Identifiable Information, Ethical Standards And Conduct
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Active Directory, Web Applications, Brute-force attacks, Microsoft Windows, Cryptographic Protocols, Bash (Scripting Language), Command-Line Interface, Shell Script, Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months