
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Threat Intelligence, Cyber Threat Hunting, Cyber Operations, Cyber Security Strategy, Cyber Attacks, Exploitation techniques, Problem Solving
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Data Ethics, Microsoft Copilot, Law, Regulation, and Compliance, Responsible AI, Compliance Management, Ethical Standards And Conduct, General Sales Practices, Sales Strategy, Information Privacy, Market Dynamics, Sales, AI Integrations, Market Analysis, Risk Analysis, Risk Mitigation
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Security Testing, Vulnerability Scanning, TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Responsible AI, AI Security, Generative AI, Data Ethics, Threat Modeling, General Data Protection Regulation (GDPR), Security Testing, Model Evaluation, Open Source Technology, Metadata Management, Data Integrity, Data Validation, Cryptographic Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Crisis Management, Data Ethics, Governance, Business Ethics, Strategic Leadership, Corporate Communications, Responsible AI, Law, Regulation, and Compliance, Communication Planning, Accountability Frameworks, Media Relations, Strategic Thinking, Communication Strategies, Business Leadership, Risk Control, Risk Management, Test Tools, Communication, Leadership, Learning Strategies
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Administration, Exploitation techniques, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks