
Coursera
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: File Management, Firewall, Linux Administration, Ubuntu, Hardening, Linux Servers, OS Process Management, Linux, Authentications, Zero Trust Network Access, Remote Access Systems, Data Security, User Accounts, Network Security, Linux Commands, Application Security, Security Strategy, Operating System Administration, Information Systems Security, IT Security Architecture
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming
Advanced · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon Web Services, Cloud Management, Cyber Governance, Security Controls, Amazon CloudWatch, Data Governance, Governance, Governance Risk Management and Compliance, Compliance Management, Multi-Tenant Cloud Environments, Continuous Monitoring, Risk Control, Account Management, Threat Detection, Automation, Configuration Management, Budget Management
Intermediate · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Cyber Security Policies, Computer Security Incident Management, Mobile Security, Security Management, Cybersecurity, Law, Regulation, and Compliance, Security Software, Data Security, Cyber Risk, Computer Security Awareness Training, Firewall, Malware Protection, Patch Management
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Wireless Networks, Authentications, Identity and Access Management, Encryption, Internet Of Things
Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Application Security, Security Management, Identity and Access Management, Network Security, Security Engineering, Cyber Security Assessment, Secure Coding, Information Systems Security, Cybersecurity, Computer Security, Security Testing, Risk Management, Security Controls, User Accounts, Data Security, Authentications, Authorization (Computing), Software Development Life Cycle, Information Technology Operations, Cryptography
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Risk Management, Incident Response, Threat Management, Risk Analysis, Business Risk Management, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Application Security, ISO/IEC 27001, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection, Compliance Management, Governance
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Tencent Cloud
Skills you'll gain: Cloud Computing Architecture, Hybrid Cloud Computing, Cloud-Native Computing, Cloud Applications, Cloud Computing, Serverless Computing, Solution Architecture, Private Cloud, Cloud Infrastructure, Data Migration, Big Data, Cloud Security, Systems Architecture, Microservices, Distributed Denial-Of-Service (DDoS) Attacks, Scalability, Artificial Intelligence, DevOps, Disaster Recovery
Advanced · Course · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
Intermediate · Course · 1 - 4 Weeks