
University of Colorado System
Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
★ 4 (279) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics
★ 4.8 (57) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Vulnerability Scanning, Kubernetes, Cloud Infrastructure, Cloud Applications, Security Testing, Cyber Security Strategy, Email Security, SQL
★ 4.7 (51) · Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Vulnerability Scanning, Security Testing, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Patch Management, Cybersecurity, Cyber Engineering, Technical Communication, Technical Writing
Beginner · Course · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
★ 4.6 (18) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Test Tools, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Network Protocols, Web Applications, Test Automation, Development Environment, Proxy Servers, Authentications, Software Installation
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Web Analytics and SEO, Content Management Systems, Web Design, Web Analytics, Supplier Management, Web Design and Development, E-Commerce, WordPress, Search Engine Optimization, No-Code Development, Blogs, Retail Management, Order Management, Order Fulfillment, Web Content, Promotional Strategies, Web Development, Content Management, Web Frameworks, Web Development Tools
Beginner · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Risk, Computer Security, Security Testing, Technical Communication, General Data Protection Regulation (GDPR)
★ 4.7 (103) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months