
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Exploitation techniques, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

Universitat Autònoma de Barcelona
Skills you'll gain: Research, Research Methodologies, Climate Change Adaptation, Qualitative Research, Social Impact, Environmental Monitoring, Community Development, Cultural Sensitivity, Sustainable Development, Environmental Issue, Intercultural Competence, Socioeconomics, Environmental Policy, Natural Resource Management, Climate Change Mitigation, Data Collection, Vulnerability, Governance, Fundraising
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Infrastructure Security, Network Security, Vulnerability Assessments, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Open Web Application Security Project (OWASP), Proxy Servers, Security Testing, Vulnerability Assessments, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Security Engineering, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Threat Management, Cybersecurity, Security Strategy, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations
Beginner · Specialization · 1 - 3 Months