
Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (7) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Incident Response, AI Security, Incident Management, Model Deployment, Site Reliability Engineering, Patch Management, MLOps (Machine Learning Operations), System Monitoring, Problem Management, Computer Security Incident Management, Package and Software Management, Continuous Monitoring, Dependency Analysis, Disaster Recovery, Anomaly Detection, Application Deployment, Automation, Dashboard Creation
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: DevSecOps, Cloud Security, Patch Management, Cyber Security Assessment, Application Security, Cloud Deployment, Internet Of Things, Infrastructure Security, Vulnerability Assessments, Cloud Services, DevOps
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Adobe Photoshop, Adobe Firefly, Photo Editing, AI powered creativity, Adobe Creative Cloud, Generative AI, Editing, AI Workflows, Post-Production
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Mac OS, Cyber Threat Intelligence, Network Security, Malware Protection, Threat Management, Endpoint Security, Threat Detection, Knowledge of Apple Software, Security Strategy, Security Controls, Security Awareness, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks