
Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Server Side, Encryption
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Governance, Network Protocols, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Private Networks (VPN), Security Controls, Cloud Security, Endpoint Security, Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cryptographic Protocols, Blockchain, Cryptography, Encryption, Business Continuity, Application Security, Disaster Recovery, Digital Assets, Threat Modeling, Vulnerability Assessments, Cybersecurity, Regulatory Compliance, Enterprise Security, Network Security, Data Security, Law, Regulation, and Compliance, Information Systems Security, Secure Coding, Key Management, Distributed Denial-Of-Service (DDoS) Attacks
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Network Security, Infrastructure Security, Software-Defined Networking, Application Security, Zero Trust Network Access, Network Architecture, Threat Modeling, Cybersecurity, Enterprise Architecture, Security Controls, Secure Coding, Cloud Security, Scenario Testing, Cryptography, Vulnerability Assessments
Advanced · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Vulnerability Scanning, Authorization (Computing), Information Privacy, Incident Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Risk Management, Security Strategy, Investigation, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks