
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Vulnerability Management, Development Environment, Security Controls, DevOps, Data Security, Software Development Life Cycle
★ 4.7 (251) · Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Cryptography, Mobile Security, Security Testing, Vulnerability Scanning, Cyber Security Assessment, Application Security, Operating System Administration, Network Security, Key Management, Operating Systems, Encryption, Hardening
★ 4 (20) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)
★ 4.7 (25) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Exploit development, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Security Testing, Scripting, Vulnerability Assessments, Hardening, Brute-force attacks, General Networking, Scripting Languages, Shell Script, Network Administration, Cybersecurity, Network Security
★ 4.3 (47) · Beginner · Specialization · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Security Testing, Application Security, Software Design, C and C++, Linux Administration, System Design and Implementation, Java, Programming Principles, Cybersecurity
★ 4.5 (607) · Intermediate · Specialization · 3 - 6 Months

Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security
★ 4.8 (31) · Beginner · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Security Controls, Vulnerability Scanning, ISO/IEC 27001, Penetration Testing, Vulnerability Assessments, Security Information and Event Management (SIEM), Data Security, Compliance Auditing, Security Assertion Markup Language (SAML), Risk Management Framework, Computer Security Incident Management, Multi-Factor Authentication, Authentications, Computer Security Awareness Training, Single Sign-On (SSO), Event Monitoring, Authorization (Computing), Encryption, Advanced Encryption Standard (AES), End User Training and Support
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, MITRE ATT&CK Framework, Systems Development Life Cycle, Cyber Governance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure
★ 4.6 (16) · Intermediate · Specialization · 1 - 4 Weeks

Packt
Skills you'll gain: Vulnerability Scanning, Penetration Testing, Network Monitoring, Network Security, Vulnerability Assessments, Network Administration, Security Testing, Network Protocols, Network Analysis, TCP/IP, File Transfer Protocol (FTP), Network Infrastructure, Software Installation, Ubuntu, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics
★ 4.8 (57) · Intermediate · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Database Systems, Computer Security Incident Management, Security Management, Databases, Operating System Administration, Database Administration, Routing Protocols, Application Development, Network Architecture, Linux Commands, TCP/IP, Operating Systems, Web Design and Development, Cascading Style Sheets (CSS), Web Development, Data Structures, File I/O, Data Analysis, Software Development
★ 4.7 (372) · Beginner · Professional Certificate · 3 - 6 Months