
Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Animations, Program Development, User Interface (UI) Design, Game Design, Computer Graphic Techniques, Model Optimization, Data Import/Export, Image Quality, Graphical Tools, Artificial Intelligence
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cloud Security, IT Security Architecture, DevSecOps, Security Controls, Security Information and Event Management (SIEM), AWS Identity and Access Management (IAM), Infrastructure as Code (IaC), Infrastructure Security, Cyber Security Assessment, Identity and Access Management, Cyber Security Policies, Cloud Computing, Vulnerability Management, Continuous Monitoring, Network Security, NIST 800-53, Authorization (Computing), Threat Detection, Auditing, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, Hardening, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Human Factors (Security), Event Monitoring, Anomaly Detection, System Monitoring, Authentications, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: AI literacy, Cybersecurity, Computer Security Awareness Training, AI Personalization, Incident Response, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Unity Engine, Video Game Development, Game Design, C# (Programming Language), Object Oriented Programming (OOP), Artificial Intelligence, Scripting
★ 4.8 (14) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks