
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
★ 4.8 (45) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Application Security, Open Web Application Security Project (OWASP), Software Testing, Secure Coding, Test Tools, Regression Testing, Unit Testing, Penetration Testing, Security Controls, Computer Security, Test Driven Development (TDD), Debugging, User Acceptance Testing (UAT), Computer Programming, Python Programming, Node.JS, Information Privacy, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Cryptographic Protocols, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Secure Coding, Key Management, Application Development, Public Key Infrastructure, Network Protocols, Data Integrity
★ 5 (6) · Intermediate · Course · 1 - 3 Months
Microsoft
Skills you'll gain: Prompt Engineering, Prompt Engineering Tools, Prompt Patterns, Microsoft Copilot, AI Integrations, AI Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Threat Detection, Generative AI
★ 4.8 (13) · Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Human Factors (Security), Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, User Interface (UI), Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
★ 4.6 (3.3K) · Mixed · Course · 1 - 3 Months

Skills you'll gain: Software Testing, Business Logic, Test Tools, Cryptography, Cybersecurity, Identity and Access Management, Authentications, Vulnerability Assessments, Encryption, Data Validation, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Incident Management, Penetration Testing, Cybersecurity, Authentications, Cyber Attacks, Security Controls, Vulnerability Assessments, Encryption, Firewall, Threat Management, User Accounts, Identity and Access Management, Mobile Security, Risk Management
★ 4.9 (30) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Application Security, Secure Coding, Threat Modeling, Security Testing, Software Development Life Cycle, Systems Development Life Cycle, Security Controls, Security Architecture Review, Risk Management Framework, Security Engineering, Information Systems Security, Computer Security, Threat Management, Software Testing, Security Requirements Analysis, Security Management, Software Development, Authorization (Computing), Software Architecture, Software Design
★ 4.3 (6) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Authorization (Computing), Information Privacy, Encryption, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
★ 4.4 (25) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Security Controls, Risk Management Framework
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Threat Intelligence, Identity and Access Management, Network Security, Endpoint Detection and Response, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Event Management
★ 5 (7) · Beginner · Course · 1 - 4 Weeks