Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Package and Software Management, Linux Administration, Linux, User Accounts, Command-Line Interface, Operating System Administration, Open Source Technology, Disaster Recovery, Red Hat Enterprise Linux, System Monitoring, Unix Commands, System Configuration, Systems Administration, Linux Commands, Security Controls, Firewall, File Management
Mixed · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux, System Monitoring, System Support, Authorization (Computing), File Management, Network Security, Data Security
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Loss Prevention, Google Cloud Platform, Application Security, Threat Management, Vulnerability Management, Personally Identifiable Information, Data Security, Infrastructure Security, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Identity and Access Management, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Threat Management, Data Security, Vulnerability Management, Threat Detection, Security Management, Event Monitoring, IT Automation, System Monitoring, System Software
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Attacks, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, AI Security, Endpoint Security, Threat Modeling, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging
Build toward a degree
Intermediate · Course · 1 - 3 Months