
Skills you'll gain: Linux Administration, Red Hat Enterprise Linux, Linux, Operating System Administration, IBM Cloud, Linux Commands, Virtualization, Systems Administration, Virtual Machines, Cloud Computing, System Monitoring, Software Installation, System Configuration
Intermediate · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Cloud Infrastructure, Vulnerability Scanning, Role-Based Access Control (RBAC), Configuration Management, Scalability
Beginner · Course · 1 - 4 Weeks

28DIGITAL
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Real-Time Operating Systems, Wireless Networks, System Programming, Hardware Architecture, Computer Architecture, Simulations, C (Programming Language), Network Protocols
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Edureka
Skills you'll gain: AI Security, Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Information Systems Security, Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Threat Detection, Artificial Intelligence, Model Deployment, Machine Learning, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Scripting, Linux Administration, Operating System Administration, Data Persistence, Shell Script, Unix Shell, Systems Administration, IT Automation, Command-Line Interface, Cloud Hosting, Object-Relational Mapping, YAML, Python Programming, File Transfer Protocol (FTP), Network Administration, OS Process Management, File Management
Mixed · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Network Protocols
Intermediate · Course · 1 - 3 Months