
Coursera
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, Security Controls, Vulnerability Assessments, Authorization (Computing), Cryptography, Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Role-Based Access Control (RBAC)
Advanced · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Blockchain, User Interface and User Experience (UI/UX) Design, Cryptography, Secure Coding, Application Security, Web Development Tools, React Redux, Encryption, User Experience Design, Key Management, Application Design, Cryptographic Protocols, Application Development, Web Applications, Software Development Tools, Legal Technology, Vulnerability Assessments, Frontend Integration, Data Security, Program Development
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Digital Forensics, Data Security, Network Analysis, Exploit development, Malware Protection, Vulnerability Assessments
Beginner · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Security Strategy, Incident Response, End User Training and Support, Human Factors (Security), Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Threat Modeling, Data Security, Security Requirements Analysis, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Authentications, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months