
Skills you'll gain: Cryptography, Encryption, Secure Coding, Brute-force attacks, Cyber Security Assessment, File Management, Python Programming, Programming Principles, Algorithms, Debugging, Scripting, Data Structures, Software Testing, User Interface (UI), Statistical Programming, File I/O, UI Components, Application Development
Beginner · Specialization · 1 - 3 Months

Universidad Nacional Autónoma de México
Skills you'll gain: Regulation and Legal Compliance, Financial Regulation, Bank Regulations, Payment Systems, Blockchain, Tax Laws, FinTech, Cyber Risk, Digital Assets, Risk Analysis, Risk Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Safety Culture, Threat Detection, Cyber Threat Intelligence, Cyber Governance, AI Security, Cybersecurity, Security Awareness, Cyber Security Strategy, Threat Management, Leadership, Cyber Risk, Culture Transformation, Cyber Security Policies, Cyber Operations, Cyber Security Assessment, Leadership Development, Cross-Functional Team Leadership, Team Leadership, Team Building, Team Motivation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Monitoring, Network Administration, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Scripting, System Configuration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: General Networking, Network Architecture, Cybersecurity, Computer Networking, Network Security, Threat Detection, Network Routers, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Firewall, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, Microsoft Windows
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Metasploit, Security Strategy, Infrastructure Security, Incident Management, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security
Advanced · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, Cybersecurity, Real-Time Operating Systems, Internet Of Things, Security Information and Event Management (SIEM), Infrastructure Security, Network Security
Beginner · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Security Controls, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Identity and Access Management, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation
Beginner · Course · 1 - 3 Months

Institut Mines-Télécom
Skills you'll gain: Cybersecurity, Open Web Application Security Project (OWASP), Application Security, Cyber Attacks, Threat Modeling, Risk Management Framework, Secure Coding, Vulnerability Assessments, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Brute-force attacks, General Networking, Network Administration, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months