
Skills you'll gain: Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Malware Protection, Information Systems Security, Security Controls, Virtual Machines, Enterprise Application Management, Virtualization, Firewall, Virtualization and Virtual Machines, Intrusion Detection and Prevention, Containerization, User Provisioning
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security
★ 4.8 (26) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Data Security, LLM Application, Cyber Attacks, Security Awareness, Large Language Modeling, Generative AI Agents
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment
★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cyber Security Policies, Security Controls, Infrastructure Security, Threat Detection, System Monitoring, Linux Administration, Linux, Linux Commands, Data Integrity
★ 3.9 (62) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Security Testing, Vulnerability Scanning, TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Security Testing, Linux Commands, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis
★ 4.3 (238) · Intermediate · Course · 1 - 4 Weeks