
Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.8 (20) · Mixed · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages
★ 4.6 (97) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Cyber Attacks, Cybersecurity, Network Security, Security Software, Cyber Security Policies, Cyber Security Strategy, Brute-force attacks, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Firewall, Exploitation techniques, AI Security, Information Assurance, Multi-Factor Authentication, Encryption, Network Protocols
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Security Testing, Vulnerability Scanning, TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management
★ 5 (9) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, Proxy Servers, SQL, MySQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cybersecurity, Malware Protection, Penetration Testing, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Vulnerability Assessments, Human Factors (Security), Cloud Security, Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Protocols, TCP/IP, General Networking, Network Monitoring, Network Security, Network Analysis, Web Servers, Linux, Software Installation
★ 4.6 (145) · Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
★ 4.8 (72) · Beginner · Guided Project · Less Than 2 Hours