
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Software Documentation, API Testing, Test Automation, Generative AI, Software Testing, AI Security, Vulnerability Assessments, Test Case, Secure Coding, Full-Stack Web Development, LLM Application, Technical Documentation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Attacks, Risk Mitigation, Business Risk Management, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Risk Modeling, Governance, Vulnerability Assessments, Information Privacy, Estimation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Risk Management Framework, Risk Analysis, Risk Management, Cybersecurity, Network Security, Incident Response, Cloud Security, Authentications, Business Continuity Planning, Application Security, IT Management, Security Management, Threat Modeling, Computer Security Incident Management, Threat Management, OSI Models, Business Risk Management, Disaster Recovery, Cryptography, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Cybersecurity, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Vulnerability Management, Incident Response, Vulnerability Assessments, Systems Architecture
Beginner · Course · 1 - 4 Weeks

Banco Interamericano de Desarrollo
Skills you'll gain: Risk Analysis, Risk Management, Risk Modeling, Hazard Analysis, Mitigation, Risk Management Framework, Project Risk Management, Failure Analysis, Analysis, Climate Change Adaptation, Vulnerability Assessments, Case Studies, Quantitative Research, Qualitative Research
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Brute-force attacks, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months