
Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks
Skills you'll gain: Data Ethics, Responsible AI, Emerging Technologies, Business Ethics, Big Data, Information Privacy, Personally Identifiable Information, Diversity Awareness, Data Security, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cyber Security Assessment, Cybersecurity, Data Ethics, Computer Networking, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Data Governance, Data Management, Law, Regulation, and Compliance, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Governance, Data Science, Cybersecurity, Risk Analysis, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months

Skills you'll gain: Microsoft Copilot, Regulation and Legal Compliance, Data Ethics, Responsible AI, Data Governance, Compliance Management, Information Privacy, Prompt Engineering, Ethical Standards And Conduct, Artificial Intelligence, Intellectual Property, Generative AI Agents, Critical Thinking
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks