
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Servers, Linux Administration, Ubuntu, Virtual Machines, Distributed Computing, Linux, Performance Tuning, Virtualization and Virtual Machines, Data Storage, File Systems, Servers, System Support, Data Storage Technologies, Software Installation, Scalability
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Business Risk Management, Risk Management, Cyber Governance, Penetration Testing, Personally Identifiable Information, Information Privacy, Vendor Management, Governance Risk Management and Compliance, Security Management, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Security Strategy, Compliance Management, Cybersecurity, Regulatory Requirements, Security Controls, Security Awareness
Intermediate · Course · 1 - 4 Weeks

Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Architecture, Software-Defined Networking, Network Planning And Design, Virtual Private Networks (VPN), Network Security, Service Oriented Architecture, Network Performance Management, Computer Networking, Emerging Technologies, Communication Systems, Network Protocols, Telecommunications, Cloud Computing Architecture, Mobile Security, Infrastructure Security, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Data Storage, OSI Models, General Networking, Wireless Networks, Data Storage Technologies, Local Area Networks, Networking Hardware, Computer Networking, Network Architecture, Network Infrastructure, TCP/IP, Performance Tuning, Network Protocols, Microsoft Windows, Network Troubleshooting, Network Security, Wide Area Networks, Command-Line Interface
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Kubernetes, Firewall, Google Cloud Platform, Cloud Security, Infrastructure Security, Network Security, Containerization
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Google Cloud Platform, Kubernetes, Generative AI, Big Data, Software Development Life Cycle, Cloud Computing, Cloud Security, Development Testing, Application Deployment, Marketing Analytics, DevOps, Application Lifecycle Management, Application Development, Network Planning And Design, Data Analysis, Software Development Tools, Vulnerability Assessments, Security Controls, Security Engineering
Intermediate · Specialization · 1 - 3 Months

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Threat Management, Threat Detection, MITRE ATT&CK Framework, Cyber Security Strategy, Security Controls, Security Engineering, Cyber Security Assessment, Application Security, DevSecOps, Vulnerability Assessments, Continuous Monitoring, Open Web Application Security Project (OWASP), Cloud Security, Risk Management Framework, Software Development Life Cycle, DevOps
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Security Management, Computer Security Incident Management, Personally Identifiable Information, Data Security, Information Assurance, Security Controls, Threat Management, Incident Management, Data Management, Auditing, Continuous Improvement Process, Business Metrics
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months