
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Metasploit, Penetration Testing, Network Administration, Software Installation, System Configuration, Web Applications, Authentications, Linux, Configuration Management
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Cybersecurity, Computer Security Incident Management, Cyber Threat Intelligence, Security Controls, Threat Management, Business Risk Management, Cyber Attacks, Cyber Operations, Threat Detection, Cloud Security, Risk Management, Cyber Governance, Security Strategy, Security Awareness, Vulnerability, Governance Risk Management and Compliance, Vulnerability Scanning, Vulnerability Assessments
Beginner · Specialization · 1 - 3 Months

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, IT Automation, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Computer Security Incident Management, Incident Response, Network Security, Information Systems Security, Security Information and Event Management (SIEM), Encryption, Security Controls, Infrastructure Security, Cyber Risk, TCP/IP, Cryptography, Vulnerability Management, Multi-Factor Authentication, Virtual Private Networks (VPN), Authentications, Operating Systems
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Application Security, Cyber Security Strategy, Patch Management, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Continuous Integration, Secure Coding, Continuous Delivery, Regulatory Compliance, Security Engineering, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Compliance Auditing
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months