
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Business Ethics, Ethical Standards And Conduct, Decision Making, Trustworthiness, Professionalism, Personal Integrity, Business Administration, Business Management, Strategic Decision-Making, Compliance Management, Leadership Studies, Environmental Social And Corporate Governance (ESG), Case Studies, Corporate Sustainability, Conflict Management, Team Leadership
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Public Key Cryptography Standards (PKCS), Cyber Attacks, Advanced Encryption Standard (AES), Secure Coding, Firewall, Application Security, Data Security, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Security Requirements Analysis, Computer Security Incident Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Python Programming, Programming Principles, File I/O, Computational Logic, Algorithms, Debugging, Scripting, Data Structures, User Interface (UI), Statistical Programming, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months
Skills you'll gain: Incident Response, Operational Risk, Case Studies, Security Management, Risk Management, Intellectual Property, Cybersecurity, Manufacturing Operations, Security Controls, Security Strategy, Cyber Security Strategy, Business Continuity Planning, Supply Chain Management, Innovation, Compliance Reporting, Continuous Improvement Process, Governance, Design
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Endpoint Security, Network Security, Cyber Attacks, Encryption, Information Systems Security, Application Security, Cyber Security Policies, Penetration Testing, Data Security, Computer Security Awareness Training, Firewall, Cryptography, Security Controls, Threat Modeling, Intrusion Detection and Prevention, Security Awareness, Mobile Security, Malware Protection, Authentications
Beginner · Course · 1 - 3 Months