
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
★ 4.7 (19) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Lightweight Directory Access Protocols, Active Directory, Windows PowerShell, Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Test Script Development, Security Testing, API Testing, Vulnerability Scanning, Cloud Security, Windows Servers, Cyber Security Assessment, Microsoft Servers, IT Automation, Scripting, Application Programming Interface (API), Microsoft Azure, Cloud Computing
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, GitHub Copilot, LangChain, LLM Application, Emerging Technologies, AI Orchestration, AI Workflows, AI Security, OpenAI, AI Integrations, ChatGPT, AI literacy, Responsible AI, Artificial Intelligence, General Networking, Cybersecurity, Network Administration, Software Development, Quantum computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols
★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Threat Detection, Network Monitoring, Network Analysis, Operating Systems
★ 4.5 (81) · Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Security Testing, Vulnerability Scanning, TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
★ 4.9 (19) · Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Internet Of Things, Security Testing, Embedded Software, Cyber Security Assessment, Hardware Troubleshooting, Vulnerability Assessments, Test Tools, Cybersecurity, Embedded Systems, Network Security, General Networking
Beginner · Course · 1 - 3 Months