
Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.8 (20) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
★ 4.9 (30) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Test Tools, Web Scraping
★ 4.3 (290) · Intermediate · Guided Project · Less Than 2 Hours

Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Management, Cyber Security Assessment, Security Controls, Cyber Attacks, Cyber Threat Intelligence, Information Systems Security, Regulatory Compliance, Financial Regulation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Management, Vulnerability Management, Cybersecurity, Cyber Security Strategy, Threat Detection, Network Security, Cyber Attacks, Patch Management, Configuration Management
★ 5 (6) · Beginner · Course · 1 - 4 Weeks

Politecnico di Milano
Skills you'll gain: Data Strategy, Data Ethics, Data Sharing, Customer Data Management, Market Opportunities, Data Governance, Data Management, Data-Driven Decision-Making, Data-Driven Marketing, Big Data, Customer Insights, Personally Identifiable Information, Data Literacy, Advertising, Strategic Thinking, Data Collection, Personalized Service, Business Transformation, Innovation, Business Modeling
★ 4.9 (18) · Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Knowledge Accelerators
Skills you'll gain: Cyber Security Policies, AI Security, Cybersecurity, Threat Management, Cyber Attacks, Cyber Risk, Email Security, Endpoint Security, Mobile Security, Remote Access Systems, Multi-Factor Authentication, Artificial Intelligence, Cloud Computing
★ 4.9 (46) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
★ 4.8 (72) · Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Threat Detection, Network Monitoring, Network Analysis, Operating Systems
★ 4.5 (81) · Beginner · Guided Project · Less Than 2 Hours