
Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Intrusion Detection and Prevention, Data Integrity, Algorithms, User Provisioning, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, Authorization (Computing), Identity and Access Management, User Provisioning, User Accounts, Role-Based Access Control (RBAC), Group Policy, Google Cloud Platform, Cyber Security Policies
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cyber Security Policies, Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Security Controls, Vulnerability Management, Computer Security Awareness Training, Incident Response, Security Software, Incident Management, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), Information Privacy, Human Factors
Beginner · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Management, Security Controls, Cyber Security Strategy, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Enterprise Security, Information Assurance, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Cryptographic Protocols, Infrastructure Security, Information Systems Security, System Configuration, Cryptography, Cloud Computing, Key Management, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Network Security, Exploit development, Vulnerability Scanning, Security Testing, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Command-Line Interface, Linux Administration, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration
Beginner · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Microsoft Azure, Identity and Access Management, User Provisioning, Active Directory, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, User Provisioning, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours