
Skills you'll gain: Cryptography, Encryption, Key Management, Python Programming, Scripting, User Interface (UI), UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Skills you'll gain: DevSecOps, AI Security, IT Security Architecture, Cyber Operations, AI Integrations, Exploit development, Incident Response, AI literacy, Zero Trust Network Access
Intermediate · Course · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Key Management, Encryption, Windows Servers, Cryptographic Protocols, Infrastructure Security, Web Servers, Active Directory, Digital Communications, Microsoft Servers, Network Infrastructure, Authentications, Server Administration, System Configuration, Data Integrity, Data Migration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Key Management, Digital Communications
Beginner · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Encryption, Cryptography, Data Security, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Intrusion Detection and Prevention, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months