
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Exploitation techniques, Mobile Security, Vulnerability Scanning, Cybersecurity, Security Testing, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Model Optimization, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Machine Learning Software, Model Training, Data Preprocessing, Data Processing, Hugging Face, Classification Algorithms
Intermediate · Course · 1 - 3 Months

Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Threat Management, Cybersecurity, Data Analysis, Data Science, Data Wrangling, Applied Machine Learning, Security Information and Event Management (SIEM), Data Cleansing, Data Transformation, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
Advanced · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Computer Security Incident Management, Vulnerability Management, Exploitation techniques
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Metasploit, Brute-force attacks, System Configuration, General Networking, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Intrusion Detection and Prevention, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Software Installation, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Operations, Vulnerability Scanning, Cyber Attacks, Computer Security, Vulnerability Assessments, Security Strategy, Cyber Security Policies, Network Security, Network Analysis, Network Protocols
Intermediate · Course · 1 - 4 Weeks