
Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Controls, CI/CD, Cybersecurity, Cyber Security Strategy, Cloud Security, Infrastructure as Code (IaC), Cloud Platforms, Vulnerability Management, Development Environment, Cloud Computing, Cloud Infrastructure, Cloud Computing Architecture, User Story, Backlogs
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
★ 5 (9) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence
★ 5 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Secure Coding, API Testing, API Design, Application Programming Interface (API), Security Testing, Penetration Testing, Application Security, Restful API, Authentications, Exploit development, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Scenario Testing, Security Controls, Development Environment, Cybersecurity
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks
★ 4.6 (612) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Exploit development, Security Testing, Cyber Security Assessment, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Exploitation techniques, Cyber Security Policies, Data Security, Amazon S3, Scenario Testing, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks