
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Threat Management, Data Security, Vulnerability Management, Threat Detection, Security Management, Event Monitoring, IT Automation, System Monitoring, System Software
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Threat Modeling, Network Security, Cybersecurity, Threat Management, Cloud Security, Malware Protection, Cyber Attacks, Threat Detection, Hardening, Application Security, Information Systems Security, Intrusion Detection and Prevention, Disaster Recovery, Security Controls, Remote Access Systems, Systems Architecture, Data Security, Information Assurance, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management, Cloud Services
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Docker (Software), Containerization, Linux, Network Troubleshooting, Linux Servers, Ansible, Kubernetes, Authentications, Infrastructure as Code (IaC), Network Administration, System Configuration, Remote Access Systems, Multi-Factor Authentication, Network Protocols, Network Security, Security Controls, Firewall, Web Servers, Encryption
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
Beginner · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, IT Security Architecture, Virtual Private Networks (VPN), Network Administration, Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Incident Response
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cloud Security, Proxy Servers, Google Cloud Platform, Firewall, Infrastructure Security, Network Monitoring, Intrusion Detection and Prevention, Threat Detection, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Web Development, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL, Command-Line Interface, Data Structures
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks