
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Exploitation techniques, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Remote Access Systems, User Accounts
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Security Management, Cyber Governance, IT Management, Cybersecurity, Cyber Security Strategy, Cyber Risk, Cyber Security Policies, Key Performance Indicators (KPIs), Leadership and Management, Technical Communication, Internal Communications, Leadership, Program Management, Risk Management, Communication, Stakeholder Communications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Vulnerability Assessments, Identity and Access Management, Asset Management
Beginner · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Exploitation techniques, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Security Requirements Analysis, Cyber Risk, Human Factors (Security), Application Servers, Web Servers
Beginner · Course · 1 - 4 Weeks

L&T EduTech
Skills you'll gain: Product Lifecycle Management, Embedded Systems, Manufacturing and Production, Robotic Process Automation, Manufacturing Processes, Control Systems, Computer-Aided Design, Programmable Logic Controllers, Automation, Internet Of Things, Production Process, Robotics, Digital Transformation, Engineering Analysis, C (Programming Language), Enterprise Resource Planning, Industrial Engineering, Supply Chain Management, Geometric Dimensioning And Tolerancing, Simulation and Simulation Software
Intermediate · Specialization · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Zero Trust Network Access, Threat Modeling, Endpoint Security, Threat Management, Endpoint Detection and Response, Threat Detection, Security Information and Event Management (SIEM), Cybersecurity, IT Automation, Security Strategy, Malware Protection, Incident Response, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Operations, Threat Management, Threat Detection, Cybersecurity, Scripting, Python Programming, Encryption, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Risk, Data Processing, Data Access, Encryption
Intermediate · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Cyber Attacks, System Monitoring, Communication Systems, Operating Systems, Linux, Bash (Scripting Language), Databases
Beginner · Specialization · 3 - 6 Months