
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cryptography, Encryption, Python Programming, Data Security
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Blockchain, Cryptography, Encryption, Cryptographic Protocols, Security Engineering, Threat Modeling, Security Architecture Review, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Transaction Processing, Exploitation techniques, Information Privacy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Network Administration, Cryptographic Protocols, IT Security Architecture, Cloud Security, Data Loss Prevention, Cloud Deployment, Cyber Attacks, Security Controls, Infrastructure Security, Computer Security, Encryption, Cloud Computing, Authorization (Computing), Network Planning And Design, Identity and Access Management, System Configuration, Data Security, Authentications, Malware Protection
Intermediate · Specialization · 1 - 3 Months

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Protection, Data Security, Cryptography, Security Management, Cybersecurity, Security Awareness, Key Management, Security Controls, Securities (Finance), Multi-Factor Authentication, Authentications, Securities Trading, Audit Working Papers, Financial Market, Market Data, Financial Regulations, Regulatory Compliance, Financial Accounting
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Blockchain, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Exploitation techniques, Transaction Processing, Algorithms
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Security, Network Administration, Cryptography, Firewall, Cryptographic Protocols, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, IT Security Architecture, Cyber Attacks, Security Controls, Public Key Infrastructure, Network Monitoring, Encryption, Network Planning And Design, Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Attacks, Endpoint Security, Infrastructure Security, Cloud Infrastructure
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cryptographic Protocols, Cyber Security Assessment, Cloud Computing, Data Security, Key Management, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Authentications, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Web Applications, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months