
Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Brute-force attacks, Cryptography, Encryption, Python Programming, Scripting, User Interface (UI), Statistical Programming, UI Components, Application Development
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Algorithms, Data Structures, File I/O
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months