
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Database Management, Cyber Security Assessment, Brute-force attacks, Cryptography, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Cybersecurity, Encryption, Vulnerability Assessments, Network Security, Network Analysis, Data Encryption Standard, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Threat Detection, Cryptographic Protocols, Cybersecurity, Cyber Threat Intelligence, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Cyber Security Strategy, Cyber Attacks, Application Security, Security Awareness, Security Controls, Data Security, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Key Management, Infrastructure Security, Public Key Infrastructure, Authentications, Mobile Security, Data Integrity, Algorithms
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, Intrusion Detection and Prevention, System Configuration, Digital Forensics, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Web Development, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL, Command-Line Interface, Data Structures
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), AI Security, Responsible AI, API Testing, Penetration Testing, OpenAI, OpenAI API, Exploitation techniques, Vulnerability Scanning, Generative AI, Large Language Modeling
Beginner · Course · 1 - 3 Months