
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Cryptography, Encryption, Cryptographic Protocols, Security Engineering, Threat Modeling, Security Architecture Review, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Transaction Processing, Exploitation techniques, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (7) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Cybersecurity, Malware Protection, Penetration Testing, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Vulnerability Assessments, Human Factors (Security), Cloud Security, Persistence
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploit development, Exploitation techniques, Vulnerability, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, System Configuration, Data Security, Cybersecurity, Cyber Attacks, Linux, Bash (Scripting Language), Proxy Servers, Scripting, Linux Commands, Scripting Languages, Python Programming
Mixed · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption
★ 4.6 (81) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.8 (20) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Exploit development, Threat Detection, Penetration Testing, Cloud Security, Exploitation techniques, Cyber Security Assessment, Vulnerability Scanning, Security Testing, Application Security, Cyber Operations, Incident Response, Security Engineering, CI/CD, Vulnerability Assessments, Python Programming, Web Scraping, Encryption, Automation
Beginner · Course · 1 - 3 Months