
Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Metasploit, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Authentications, Integration Testing, Linux
Beginner · Course · 1 - 3 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Blockchain, Cryptography, FinTech, Governance, Emerging Technologies, Payment Systems, Transaction Processing, Distributed Computing, Digital Assets, Cyber Governance, Regulation and Legal Compliance, Ledgers (Accounting), Data Security, Interoperability, Case Studies, Scalability
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Tencent Cloud
Skills you'll gain: Cloud Computing Architecture, Hybrid Cloud Computing, Cloud-Native Computing, Cloud Applications, Cloud Computing, Serverless Computing, Solution Architecture, Private Cloud, Cloud Infrastructure, Data Migration, Big Data, Cloud Security, Systems Architecture, Microservices, Distributed Denial-Of-Service (DDoS) Attacks, Scalability, Artificial Intelligence, DevOps, Disaster Recovery
Advanced · Course · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Cloud Security, Cyber Risk, Intrusion Detection and Prevention, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Security Controls, Email Security, Risk Management
Beginner · Specialization · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Business Risk Management, Governance Risk Management and Compliance, Legal Risk, Interoperability, IT Security Architecture, Cyber Risk, Network Architecture, Systems Architecture, Data Architecture, Governance, Solution Architecture, Information Technology Architecture, Application Security, Cryptography, Data Storage, Data Storage Technologies
Beginner · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Cyber Threat Intelligence, Responsible AI, Cybersecurity, Threat Detection, Threat Modeling, Security Information and Event Management (SIEM), Incident Response, AI Security, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Exploit development, Security Testing, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Application Security, Web Servers, Network Protocols, Web Applications, Test Automation, Development Environment, Proxy Servers, Authentications
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Penetration Testing, Cyber Governance, Risk Management, Vendor Management, Governance Risk Management and Compliance, Security Awareness, Security Strategy, Business Risk Management, Cyber Security Policies, Compliance Management, Business Continuity, Personally Identifiable Information, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
Intermediate · Course · 1 - 3 Months