
Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), LLM Application, Model Deployment, Large Language Modeling, Responsible AI, Google Cloud Platform, Application Programming Interface (API), System Configuration, Application Development
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Large Language Modeling, Cloud Security, Responsible AI, Application Security, Secure Coding, Prompt Engineering, Google Cloud Platform, Cloud API, API Design, Configuration Management
Beginner · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Selenium (Software), Software Testing, Security Testing, Test Automation, Performance Testing, Functional Testing, Test Script Development, Test Tools, Test Execution Engine, Test Planning, Application Security, Mobile Development, Browser Compatibility
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Secure Coding, Model Deployment, Threat Modeling, Large Language Modeling, Security Controls, Cloud API, Threat Detection, Application Programming Interface (API), API Design
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: AI Security, Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Threat Modeling, Cyber Security Assessment, Risk Analysis, Application Security, Vulnerability Assessments, Network Security
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Secure Coding, Security Testing, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Web Applications, Browser Compatibility, Computer Programming
Beginner · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Pearson
Skills you'll gain: AI Security, Retrieval-Augmented Generation, AI Orchestration, Responsible AI, LangChain, Threat Modeling, Generative AI, Vector Databases, Embeddings, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Threat Management, Security Testing, Security Controls, Prompt Engineering
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Software Design Patterns, Software Architecture, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Software Testing, Open Web Application Security Project (OWASP), Business Logic, Secure Coding, Cryptography, Cybersecurity, Test Case, Identity and Access Management, Authentications, Vulnerability Assessments, Threat Modeling, Encryption, Data Validation, Network Protocols, Authorization (Computing), Web Applications
Intermediate · Course · 1 - 4 Weeks