
Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (7) · Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Application Security, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers
★ 4.7 (9) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, GitHub Copilot, LangChain, LLM Application, Emerging Technologies, AI Orchestration, AI Workflows, AI Security, OpenAI, AI Integrations, ChatGPT, AI literacy, Responsible AI, Artificial Intelligence, General Networking, Cybersecurity, Network Administration, Software Development, Quantum computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)
★ 4.7 (34) · Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Cybersecurity, AI Security, Data Persistence, Incident Management, Technical Communication, Risk Analysis
★ 4.9 (11) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Linux Administration, Version Control, Linux, Git (Version Control System), Linux Commands, Network Troubleshooting, Unix, Operating System Administration, Bash (Scripting Language), Systems Administration, Scripting, User Provisioning, Shell Script, User Accounts, Software Versioning, System Configuration, Unix Shell, Scripting Languages, Package and Software Management, Network Administration
★ 4.4 (22) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks