
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, AWS Identity and Access Management (IAM), Cyber Governance, Cloud Management, Key Management, Amazon S3, Amazon CloudWatch, Data Encryption Standard, AWS CloudFormation, Infrastructure as Code (IaC), Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Network Monitoring, Network Protocols, Network Troubleshooting, Network Security, Network Administration, Network Analysis, Cyber Security Assessment, Linux
Intermediate · Guided Project · Less Than 2 Hours

EC-Council
Skills you'll gain: Network Security, Cybersecurity, Information Assurance, Cloud Security, Security Controls, Mobile Security, Data Security, Cryptography, Public Key Infrastructure, Cyber Security Policies, Authorization (Computing), Intrusion Detection and Prevention, Network Monitoring, Continuous Monitoring, Wireless Networks, Identity and Access Management, Encryption, Threat Detection, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Institut Mines-Télécom
Skills you'll gain: Cybersecurity, Open Web Application Security Project (OWASP), Application Security, Cyber Attacks, Threat Modeling, Risk Management Framework, Secure Coding, Vulnerability Assessments, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Telecommuting, Threat Modeling, Cyber Security Strategy, Security Controls, Security Strategy, Problem Management, Security Awareness, Employee Engagement
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
Advanced · Course · 3 - 6 Months