
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, Threat Management, AI Security, Responsible AI, Malware Protection, Cybersecurity, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Policies, Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Incident Response, Security Software, Incident Management, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), Information Privacy, Human Factors
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Penetration Testing, Cyber Security Assessment, Application Security, Cyber Security Strategy, Cyber Threat Intelligence, Vulnerability Scanning, Security Controls, Network Monitoring, Data Security, Cyber Risk
★ 4.7 (50) · Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Model Optimization, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Machine Learning Software, Model Training, Data Preprocessing, Data Processing, Hugging Face, Classification Algorithms
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
★ 4.6 (558) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Brute-force attacks, System Configuration, General Networking, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Intrusion Detection and Prevention, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Software Installation, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Network Security, Penetration Testing, Configuration Management, System Configuration, Firewall, Linux Commands, Servers, Command-Line Interface, TCP/IP, Network Analysis, Software Versioning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence
★ 5 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks