
Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Risk Analysis, Network Security, Risk Mitigation, Cyber Governance, Compliance Auditing, Event Monitoring, Application Security, Cyber Security Policies, Cyber Risk, Computer Security, Governance, Data Security, Information Systems Security, Infrastructure Security, Mobile Security, Risk Management
Intermediate · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cybersecurity, Vulnerability Scanning, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, AI Security, Exploit development, Network Security, Cyber Security Assessment, Exploitation techniques, Open Web Application Security Project (OWASP), Application Security, Computer Security, Unix, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Web Applications, Server Side, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

The University of Sydney
Skills you'll gain: Blockchain, Distributed Computing, Security Engineering, Network Security, Scalability, Cryptography, Data Integrity, Transaction Processing, Algorithms
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric
Mixed · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Business Continuity Planning, Continuous Monitoring, Security Management, ISO/IEC 27001, Security Controls, Information Systems Security, Risk Management, Risk Analysis, Security Strategy, Cyber Governance, Threat Modeling, NIST 800-53, Compliance Management, Regulatory Requirements
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Security Controls
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Data Persistence, Virtual Machines
Intermediate · Course · 1 - 3 Months