
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, Cybersecurity, Debugging, SQL
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Server Side
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Firewall, Intrusion Detection and Prevention, Network Security, Infrastructure Security, Threat Detection, Cloud Security, Network Monitoring, Network Performance Management, Performance Tuning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cloud Security, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy, Wireless Networks, Application Programming Interface (API), Security Controls
Intermediate · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Security Strategy, Responsible AI, Risking, Law, Regulation, and Compliance, Personally Identifiable Information, Threat Modeling, Data Security, Security Management, Information Assurance, Infrastructure Security, Cybersecurity, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Incident Response, Endpoint Security, Zero Trust Network Access, Authentications, Risk Analysis, Network Security, Cyber Governance, Cloud Computing, Compliance Auditing, Cyber Risk, Cyber Security Policies, Network Architecture, Governance, Information Systems Security, Data Security, Infrastructure Security, Mobile Security, Encryption, Risk Management
Intermediate · Specialization · 1 - 3 Months

Universitat Politècnica de València
Skills you'll gain: Encryption, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security Awareness Training, Cybersecurity, Cyber Attacks, Identity and Access Management, Security Awareness, Data Security, Personally Identifiable Information, User Accounts, Information Systems Security, Human Factors (Security), Email Security, Cyber Risk, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months