
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Infrastructure Security, Vulnerability Scanning, Network Security, Amazon Web Services, Firewall, Vulnerability Assessments, Network Infrastructure, Virtual Private Networks (VPN), Security Controls, Cloud Security, Endpoint Security, Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Secure Coding, Application Security, Security Engineering, Software Design Patterns, Web Applications, Application Programming Interface (API), Vulnerability Assessments, Debugging, Transaction Processing, System Programming, Scalability
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Security Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Exploitation techniques, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Cloud Computing, Penetration Testing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Application Security, Secure Coding, Threat Modeling, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Non-Verbal Communication, Storytelling, Conflict Management, Interpersonal Communications, Driving engagement, De-escalation Techniques, Rapport Building, Diversity Awareness, Workplace inclusivity, Cultural Sensitivity, Ethical Standards And Conduct, Psychology, Vulnerability
Beginner · Course · 1 - 4 Weeks

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Continuous Monitoring, Medical Privacy, Risk Management, Health Information Management, Health Care Procedure and Regulation, Risk Mitigation, Information Privacy, Security Management, Risk Analysis, Patient Safety, Personally Identifiable Information, Information Systems Security, Security Controls, Data Security, Regulatory Compliance, Threat Modeling, Vulnerability Assessments
Beginner · Course · 1 - 3 Months