
Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Hardening, Local Area Networks, Threat Detection, General Networking, Vulnerability Management, System Configuration, Linux Administration, Authentications, Software Installation, Virtual Machines, Network Analysis, Virtualization
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Prompt Engineering Tools, Cloud Security, Containerization, Prompt Patterns, OAuth, Cloud Platforms, Cloud Storage, Cloud Services, Application Deployment, Security Controls, Threat Management, Application Security, Data Security
★ 4.7 (50K) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring
★ 4.7 (459) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Security Strategy, Cyber Risk, Cyber Attacks, Security Management, End User Training and Support, Human Factors, Behavioral Management
★ 4.7 (260) · Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Network Model, IT Security Architecture, Exploitation techniques, Security Controls, Security Awareness, Systems Design, System Design and Implementation, Cryptography, Resilience, Service Recovery
★ 5 (6) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Encryption, Cryptographic Protocols, Security Engineering, Threat Modeling, Security Architecture Review, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Transaction Processing, Exploitation techniques, Information Privacy
Beginner · Course · 1 - 4 Weeks

28DIGITAL
Skills you'll gain: Cybersecurity, Cyber Attacks, AI Security, Network Security, Information Systems Security, Data Ethics, Deep Learning, Responsible AI, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Machine Learning Methods, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning, Classification Algorithms
Intermediate · Course · 1 - 4 Weeks