
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Vulnerability Management, Security Controls, System Monitoring, Event Monitoring, Security Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Cloud Deployment, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, System Configuration, Firewall, Cloud Computing Architecture, Linux, Risk Management
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Network Security, Cyber Attacks, Information Systems Security, Firewall, Malware Protection, Intrusion Detection and Prevention, Brute-force attacks, Internet Of Things, Threat Detection, Exploitation techniques, Network Protocols, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, Vulnerability Scanning, Continuous Deployment
Advanced · Course · 1 - 4 Weeks

Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Operating System Administration, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Linux Commands, Network Administration, Active Directory, System Monitoring, System Configuration, Network Security, Security Controls, Command-Line Interface, Malware Protection, Service Management
Mixed · Course · 1 - 4 Weeks
Skills you'll gain: Vulnerability Scanning, Digital Forensics, Linux, Linux Administration, Network Security, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Penetration Testing, Cybersecurity, Containerization, Incident Response
Beginner · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Exploitation techniques, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Security Requirements Analysis, Cyber Risk, Human Factors (Security), Application Servers, Web Servers
Beginner · Course · 1 - 4 Weeks