
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Data Ethics, Generative AI, Risking, Business Ethics, Legal Risk, Socioeconomics, Ethical Standards And Conduct, Environmental Social And Corporate Governance (ESG), Information Privacy, Automation, Workforce Development, Accountability
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Fractal Analytics
Skills you'll gain: Responsible AI, Data Governance, Data Ethics, Data Pipelines, Data Architecture, Data Management, Governance, Data Integrity, Artificial Intelligence, Metadata Management, Automation, Generative AI, Data Security
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks