
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, Telecommunications, Infrastructure Security, Data Security, Cryptography, Bash (Scripting Language), Regulatory Compliance, Unix, Encryption, Authorization (Computing), Compliance Management, Governance Risk Management and Compliance, Virtualization
Build toward a degree
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Packt
Skills you'll gain: Vulnerability Scanning, Network Security, Network Administration, Network Protocols, Network Analysis, TCP/IP, File Transfer Protocol (FTP), Software Installation, Ubuntu, Command-Line Interface, Open Source Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Monitoring, Network Administration, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Scripting, System Configuration
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Security Controls, Application Security, Threat Management, Cloud Management, Data Security, Virtual Machines, Cloud Storage, Data Access, Threat Detection, Vulnerability Scanning, Data Loss Prevention, Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Computer Security Incident Management, Data Security, Vulnerability Assessments, Law, Regulation, and Compliance, Threat Detection, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Security Strategy, Telecommuting, Infrastructure Security
Beginner · Specialization · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cyber Threat Intelligence, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Brute-force attacks, Encryption, Network Security, Technical Writing
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Threat Hunting, Cyber Security Assessment, Virtual Machines, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Strategy, Continuous Monitoring, Patch Management, Security Strategy
Intermediate · Course · 1 - 4 Weeks