
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence
★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Virtual Networking, Cloud Infrastructure, Data Import/Export, Network Architecture, Identity and Access Management, Generative AI, Network Planning And Design, AI Workflows, Network Performance Management, General Networking, Network Protocols, Network Infrastructure, Load Balancing, Distributed Computing
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Security Testing, Cybersecurity, Vulnerability Assessments, Network Security, Web Applications, SQL
Beginner · Course · 1 - 4 Weeks
DeepLearning.AI
Skills you'll gain: Generative Adversarial Networks (GANs), Autoencoders, Generative AI, Tensorflow, Computer Vision, Image Analysis, Transfer Learning, Convolutional Neural Networks, Generative Model Architectures, Fine-tuning, Deep Learning, Keras (Neural Network Library), Model Training, Model Optimization, Applied Machine Learning, Artificial Neural Networks, Classification Algorithms, Model Evaluation, Distributed Computing, Visualization (Computer Graphics)
★ 4.8 (1.7K) · Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Video Editing, Storyboarding, Post-Production, Editing, Videography, Animations, Visual Storytelling, Typography
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks