
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Scrimba
Skills you'll gain: Object Oriented Programming (OOP), File I/O, Python Programming, Data Structures, Computer Programming, Scripting, Software Engineering, Performance Tuning, Web Development, Debugging, Random Forest Algorithm, Web Development Tools
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Serverless Computing, Amazon S3, Amazon Web Services, Kubernetes, Containerization, Cloud Storage, Disaster Recovery, Application Deployment, Cloud Deployment, Cloud Computing Architecture, Cloud Solutions, Data Storage Technologies
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), User Provisioning, Verification And Validation, User Accounts, Multi-Tenant Cloud Environments, Test Case, Secure Coding, Data Structures
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Non-Verbal Communication, Exploitation techniques, Human Factors (Security), Investigation, Data Collection, Cyber Threat Intelligence, Security Awareness, Persuasive Communication, Social Sciences, Rapport Building, Email Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Security Assessment, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Exploitation techniques, Security Management, Network Security, Digital Forensics, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Brute-force attacks, Virtual Machines, Software Documentation, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Scripting, Remote Access Systems
Intermediate · Course · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months