
Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Endpoint Security, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Encryption
★ 4.6 (14) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Security Testing, Application Security, Test Tools, Web Servers, Content Management Systems, Application Programming Interface (API), Databases
★ 4.6 (8) · Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Hunting, Data Security, Security Strategy, Email Security, Authentications, Security Management
★ 4.7 (27) · Beginner · Course · 1 - 4 Weeks

John Wiley & Sons
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Cybersecurity, Security Testing, IT Security Architecture, Cyber Security Assessment, Cyber Security Strategy, Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Risk Management, Information Systems Security, Vulnerability Scanning, Vulnerability Assessments, Security Controls, Penetration Testing, Incident Response, Vendor Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Data Security, Emerging Technologies, Quantum computing
Intermediate · Course · 1 - 4 Weeks

John Wiley & Sons
Skills you'll gain: Incident Response, Computer Security Incident Management, Security Controls, Incident Management, Business Continuity Planning, Security Management, Business Continuity, Disaster Recovery, Security Strategy, Cyber Security Strategy, Cybersecurity, Threat Management, Contingency Planning, Risk Management, Information Systems Security, Operational Risk, Risk Management Framework, Risk Analysis, Cyber Risk, Security Awareness
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Cryptographic Protocols, Application Design, Exploitation techniques, Event Monitoring, Intrusion Detection and Prevention, Server Side, Continuous Monitoring, Computer Security Incident Management, System Monitoring, System Configuration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Risk Management, Security Management, Continuous Monitoring, Information Assurance, Law, Regulation, and Compliance, Cyber Governance, Governance, Regulation and Legal Compliance, Cybersecurity, Security Controls, Risk Mitigation, Cyber Security Policies, Business Risk Management, Risk Management Framework, ISO/IEC 27001, Risk Control, Risk Analysis, Threat Management, Information Systems
★ 4.7 (54) · Advanced · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Business Continuity Planning, Cryptography, Security Architecture Review, Disaster Recovery, Business Continuity, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Governance Risk Management and Compliance
★ 4.4 (25) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months