Skills you'll gain: Incident Response, AI Security, Incident Management, Model Deployment, Site Reliability Engineering, Patch Management, MLOps (Machine Learning Operations), System Monitoring, Problem Management, Computer Security Incident Management, Package and Software Management, Continuous Monitoring, Dependency Analysis, Disaster Recovery, Anomaly Detection, Application Deployment, Automation, Dashboard Creation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Video Editing, Editing, Video Production, Post-Production, Storytelling, Visual Storytelling
Beginner · Course · 1 - 4 Weeks

L&T EduTech
Skills you'll gain: Accident Prevention, Safety Standards, Safety Training, Construction, Maintenance, Repair, and Facility Services, Hazard Analysis, Emergency Response, Hydraulics, Construction Engineering, Facility Repair And Maintenance, General Construction and Construction Labor, Equipment Design, Waste Minimization, Sustainable Engineering, Grading (Landscape), Civil Engineering, Personal protective equipment, Construction Management, Construction Estimating, Structural Engineering
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Adobe Photoshop, Design Software, Journals, Software Design Patterns, Creative Design, Design Elements And Principles, Graphic and Visual Design Software, Creativity, Design Strategies, Design, Graphic and Visual Design, Graphic Design, Visual Storytelling, Digital Design, Graphics Software, Aesthetics, Editing, File Management
Beginner · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months