Pen testing courses can help you learn vulnerability assessment, network security, and ethical hacking techniques. You can build skills in penetration testing methodologies, risk analysis, and incident response strategies. Many courses introduce tools like Metasploit, Wireshark, and Burp Suite, that support identifying and exploiting security weaknesses in systems and applications. By engaging with these tools, you can practice practical work that enhance your ability to secure networks and protect sensitive data.

Skills you'll gain: Email Marketing, Customer Retention, Customer Relationship Building, E-Commerce, Strategic Marketing, Online Advertising, Performance Metric, Copywriting, Sales, Decision Making, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Waste Minimization, Environmental Engineering, Sustainable Engineering, Civil Engineering, Environmental Regulations, Sustainable Technologies, Environmental Resource Management, Environmental Laws, Environmental Policy, Transportation Operations, Environmental Monitoring, Estimation, Laboratory Testing, Internet Of Things, Emerging Technologies
Intermediate · Course · 1 - 4 Weeks

Codio
Skills you'll gain: Prompt Engineering, Generative AI, OpenAI, Animations, Image Analysis, Image Quality, ChatGPT, Visualization (Computer Graphics), Computer Graphics, Application Programming Interface (API)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Apple Xcode, Apple iOS, Debugging, iOS Development, Performance Tuning, Swift Programming, Mobile Development Tools, Development Environment, Program Development, Software Testing, Application Performance Management, User Interface (UI)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Governance, Governance Risk Management and Compliance, Enterprise Security, Compliance Management, Regulatory Requirements, Business Metrics, Performance Metric, Ethical Standards And Conduct
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Docker (Software), Integration Testing, Object-Relational Mapping, Secure Coding, Database Design, Solution Architecture, Enterprise Architecture, Systems Integration, Authorization (Computing), Database Development, Data Validation, Transaction Processing
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Cyber Attacks, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Security Strategy
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Qualitative Research, Research Design, Surveys, Focus Group, Research Methodologies, Research, Data Collection, Interviewing Skills, Case Studies, Analysis, Report Writing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Metadata Management, Data Pipelines, Data Processing, Google Cloud Platform, Data Migration, Cloud Storage, Apache Airflow, Data Lakes, Data Storage, Big Data, Data Infrastructure, Extract, Transform, Load, Apache Spark, IT Automation, Data Management, Data Transformation, Serverless Computing, SQL
Beginner · Course · 1 - 3 Months

Skills you'll gain: MySQL, Data Migration, Google Cloud Platform, Operational Databases, Database Administration, Virtual Private Networks (VPN), Database Management
Advanced · Project · Less Than 2 Hours

Parsons School of Design, The New School
Skills you'll gain: Design Thinking, Market Opportunities, Design and Product, Business Risk Management, Strategic Thinking, Process Design, Human Centered Design, Innovation, Design, User Experience, Business Modeling, Customer experience strategy (CX), Ethical Standards And Conduct
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months