
Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Scanning, Vulnerability Assessments, Application Security, Authentications, Wireless Networks, Network Security, Linux, Encryption
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Vulnerability Scanning, Security Awareness, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Malware Protection, Email Security, Network Security, Fraud detection, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Database Systems, Computer Security Incident Management, Security Management, Ubuntu, Routing Protocols, Database Design, Application Development, Network Architecture, Linux Commands, TCP/IP, Operating Systems, Database Theory, Web Design and Development, Cascading Style Sheets (CSS), Web Development, Data Structures, Python Programming, Data Analysis, Software Development
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Security Assessment, Network Security, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Vulnerability Assessments, Application Security, Intrusion Detection and Prevention, Security Awareness, Web Servers
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Beginner · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Vulnerability Assessments, Mobile Security, Open Web Application Security Project (OWASP), Cloud Security, Threat Modeling, MITRE ATT&CK Framework, Network Security, Business Logic, Scripting, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months