
Skills you'll gain: Technical Documentation, Brute-force attacks, Information Systems Security, Cybersecurity, Virtual Machines, Virtual Environment, Network Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Test Script Development, Technical Communication, Scripting, Technical Writing, Automation, Technical Consulting, Security Controls
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Vulnerability Scanning, Network Protocols, Brute-force attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Linux Commands
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months