
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Exploitation techniques, Test Tools, Virtual Machines, Technical Documentation, Microsoft Windows, Scripting
Intermediate · Course · 3 - 6 Months

University of Leeds
Skills you'll gain: Test Case, Software Testing, Software Quality Assurance, Quality Assurance, Verification And Validation, Software Development Life Cycle, Software Development
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Protocols, Network Analysis, Network Monitoring, Image Analysis, Virtual Machines, Virtualization and Virtual Machines, Virtual Environment, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation, File Management, Microsoft Windows
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Security Testing, Incident Response, Cyber Attacks, Firewall, Computer Security Incident Management, Cyber Security Strategy, Vulnerability Scanning, Computer Security, Cyber Threat Intelligence, Information Systems Security, Network Protocols, Exploitation techniques, Brute-force attacks, Email Security, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Software Installation
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
Mixed · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Internet Of Things, Security Testing, Embedded Software, Cyber Security Assessment, Hardware Troubleshooting, Vulnerability Assessments, Test Tools, Cybersecurity, Embedded Systems, Network Security, General Networking
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Cryptographic Protocols, Application Design, Exploitation techniques, Event Monitoring, Intrusion Detection and Prevention, Server Side, Continuous Monitoring, Computer Security Incident Management, System Monitoring, System Configuration
Intermediate · Course · 1 - 3 Months