
Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Web Development, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL, Command-Line Interface, Data Structures
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Network Analysis, Operating Systems
Beginner · Guided Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Vulnerability Scanning, Network Protocols, Brute-force attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming
Advanced · Course · 1 - 3 Months

Skills you'll gain: Brute-force attacks, General Networking, Network Administration, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Site Reliability Engineering, Incident Management, AI Security, MLOps (Machine Learning Operations), Model Deployment, Patch Management, Problem Management, DevOps, System Monitoring, Continuous Monitoring, Dependency Analysis, Sprint Retrospectives, Disaster Recovery, Artificial Intelligence, Vulnerability Assessments, Automation, Dashboard
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging
Build toward a degree
Intermediate · Course · 1 - 3 Months