
Skills you'll gain: Open Web Application Security Project (OWASP), SonarQube, Threat Modeling, Secure Coding, Application Security, Security Testing, DevSecOps, Code Review, Maintainability, Vulnerability Scanning, Software Quality (SQA/SQC), Risk Mitigation, Software Quality Assurance, MITRE ATT&CK Framework, Vulnerability Assessments, Cyber Security Assessment, Software Technical Review, Continuous Integration, Vulnerability Management, Cyber Attacks
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Secure Coding, Security Testing, Open Web Application Security Project (OWASP), Vulnerability, Software Testing, Computer Security, Vulnerability Management, Data Security, Security Strategy, Unit Testing, Human Factors (Security), Application Design, Information Privacy, Computer Programming, Python Programming, Node.JS, Javascript, Design Strategies, JavaScript Frameworks
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Record Keeping, Vulnerability Scanning, Security Testing, Data Management, Cloud Management, Threat Management, Cyber Security Assessment, Records Management, Cloud Computing Architecture, Authentications, Firewall, Cyber Attacks, Cybersecurity, Cyber Threat Intelligence, Authorization (Computing), Generative Adversarial Networks (GANs), Active Directory, Data Ethics, AI Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, User Experience Design, Vulnerability Assessments, Database Theory, Unified Modeling Language, Unit Testing, UI/UX Research, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Data Flow Diagrams (DFDs), Relational Databases, Software Visualization, Security Engineering, Security Software, Systems Development Life Cycle, Software Development Life Cycle
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, Business Continuity, Cryptographic Protocols, Network Security, Cryptography, Encryption, User Provisioning, Security Management, Penetration Testing, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, Cyber Operations, Data Management, Vulnerability Management, Software Development Methodologies, Cybersecurity, Configuration Management
Beginner · Specialization · 3 - 6 Months

Board Infinity
Skills you'll gain: Risk Management Framework, Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Cyber Risk, Business Continuity, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Incident Management, Operational Risk, Business Risk Management
Intermediate · Specialization · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Digital Forensics, File Systems, Microsoft Windows, grep, TCP/IP, Network Protocols, Data Security, File Management, Operating Systems, Data Structures, General Networking, Data Validation, File I/O, Record Keeping, Data Integrity, Data Storage, User Accounts, USB, Ethical Standards And Conduct, System Configuration
Intermediate · Specialization · 3 - 6 Months