
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Advancing Women in Tech
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Business Priorities, Enterprise Security, Security Awareness, Security Management, Regulatory Compliance, Compliance Management, Risk Management, Communication
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Strategy, Data Security, Cyber Threat Intelligence, Computer Security Awareness Training, Zero Trust Network Access, Information Systems Security, Security Awareness, Security Engineering, Threat Detection, Human Factors (Security), Cultural Sensitivity, Security Controls, Incident Response, Proactivity, Fraud detection, Information Technology
Beginner · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Network Security, Vulnerability Assessments, MITRE ATT&CK Framework, Mobile Security, Threat Detection, Application Security, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Encryption, Information Assurance, Hardening, Exploitation techniques, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Automation, Technical Consulting, Security Controls
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Command-Line Interface, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Enterprise Security, Information Assurance, Incident Response, Data Integrity
Beginner · Course · 1 - 4 Weeks