
Coursera
Skills you'll gain: Operations Research, Strategic Decision-Making, Decision Intelligence, Generative AI, Business Analytics, Advanced Analytics, Analytics, Process Optimization, Applied Machine Learning, Predictive Analytics, Artificial Intelligence, Decision Making, Performance Analysis, Model Evaluation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Autoencoders, Recurrent Neural Networks (RNNs), Deep Learning, Artificial Neural Networks, Reinforcement Learning, Generative AI, Generative Adversarial Networks (GANs), Generative Model Architectures, Unsupervised Learning, Responsible AI, Data Ethics, Markov Model
★ 4 (7) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (67) · Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages
★ 4.6 (98) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
★ 5 (9) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Encryption, Cybersecurity, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Data Mapping, Software Testing, Data Structures
★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
★ 4.8 (14) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems
Mixed · Course · 1 - 4 Weeks