
Packt
Skills you'll gain: Secure Coding, API Testing, API Design, Application Programming Interface (API), Security Testing, Penetration Testing, Application Security, Restful API, Authentications, Exploit development, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Scenario Testing, Security Controls, Development Environment, Cybersecurity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Unix, Security Testing, Network Security, Cybersecurity, Application Security, Information Systems Security, Cyber Attacks, Network Analysis, Web Applications, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks