
Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Healthcare Ethics, Responsible AI, Ethical Standards And Conduct, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Diversity Training, Computer Science, Diversity Programs, digital literacy, Medical Privacy, Information Privacy, Diversity Equity and Inclusion Initiatives, Social Impact, AI Personalization, Media and Communications, Clinical Research Ethics
Build toward a degree
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Security Assessment, Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Risk, Computer Security, Security Testing, Technical Communication, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Vulnerability Scanning, Security Testing, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Patch Management, Cybersecurity, Cyber Engineering, Technical Communication, Technical Writing
Beginner · Course · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Security Testing, Network Security, Cyber Security Assessment, Cybersecurity, Cloud Computing, Cyber Attacks, Brute-force attacks, Exploitation techniques, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: ASP.NET, .NET Framework, C# (Programming Language), Object Oriented Programming (OOP), Web Development, Web Applications, Object Oriented Design, Application Frameworks, Programming Principles, Event-Driven Programming
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Cybersecurity, AI Security, Data Persistence, Incident Management, Technical Communication, Risk Analysis
Advanced · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Application Security, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
Mixed · Course · 1 - 4 Weeks