
Cisco Learning and Certifications
Skills you'll gain: IT Automation, Network Engineering, Network Architecture, Scripting, Application Programming Interface (API), Data Modeling, General Networking, Network Planning And Design, Automation, Network Administration, Linux Commands, Python Programming, Program Development
★ 4.6 (90) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Cyber Security Assessment, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Human Factors (Security), Network Analysis, Scripting, Virtual Machines, Linux, Technical Communication
Advanced · Course · 3 - 6 Months

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
★ 4 (9) · Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Bash (Scripting Language), Network Monitoring, Network Analysis, Network Security, Network Protocols
★ 4.6 (10) · Intermediate · Guided Project · Less Than 2 Hours

University of Minnesota
Skills you'll gain: Pain Management, Pharmacology, Pharmacy, Pharmaceuticals, Pharmacotherapy, Medical Prescription, Clinical Pharmacy, Substance Abuse, Sensory Systems Analysis, Neurology, Life Sciences, Physiology, Molecular Biology, Molecular, Cellular, and Microbiology, Research, Laboratory Research, Biology, Science and Research
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)
★ 4.7 (25) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Scanning, Network Security, Penetration Testing, Configuration Management, System Configuration, Firewall, Linux Commands, Servers, Command-Line Interface, TCP/IP, Network Analysis, Software Versioning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Authentications, Application Deployment, Operating System Administration, Cyber Security Policies, Azure Active Directory, Group Policy, Enterprise Application Management, Identity and Access Management, Cloud Applications, Enterprise Security, Mobile Security, Endpoint Detection and Response, System Configuration, Security Management, User Provisioning, Android (Operating System), Patch Management
★ 4.8 (30) · Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity
★ 4.8 (17) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting
★ 5 (7) · Intermediate · Course · 3 - 6 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months