
Packt
Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Active Directory, Web Applications, Brute-force attacks, Microsoft Windows, Cryptographic Protocols, Bash (Scripting Language), Command-Line Interface, Shell Script, Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Malware Protection, Network Security, Cybersecurity, Cyber Attacks, Information Systems Security, Intrusion Detection and Prevention, Penetration Testing, Firewall, Hardening, Threat Detection, Brute-force attacks, Internet Of Things, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Web Development, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL, Command-Line Interface, Data Structures
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Intermediate · Course · 3 - 6 Months