
Skills you'll gain: Linux Administration, Linux, User Accounts, Identity and Access Management, Authentications, Virtual Machines, Authorization (Computing), Virtualization, Operating System Administration, Security Controls, System Configuration, Virtual Environment, Command-Line Interface, Software Installation
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Security Testing, Cybersecurity, Network Security, Brute-force attacks, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols, Program Development
Intermediate · Course · 1 - 3 Months
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Vulnerability Management, Security Testing, Penetration Testing, Security Awareness, Security Strategy, DevOps, Security Management, Computer Security Awareness Training, Technology Roadmaps, Risk Management Framework
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Vulnerability Scanning, Digital Forensics, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Security Testing, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Cybersecurity
★ 5 (7) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Authorization (Computing), Information Privacy, Encryption, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Cryptographic Protocols, Infrastructure Security, Information Systems Security, System Configuration, Cryptography, Cloud Computing, Key Management, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Human Factors (Security), Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, User Interface (UI), Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
★ 4.6 (3.3K) · Mixed · Course · 1 - 3 Months

Skills you'll gain: General Networking, IT Security Architecture, Network Architecture, TCP/IP, OSI Models, Threat Management, Cybersecurity, Networking Hardware, Information Technology, Network Security, Threat Detection, Network Routers, Infrastructure Security, Security Controls, Cyber Attacks, Network Switches, Diagram Design, Cyber Security Strategy, Firewall, Security Software
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Servers, Linux Commands, Network Administration, Cryptography, User Accounts, Key Management, Brute-force attacks
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security
★ 4.8 (26) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
★ 4.8 (12) · Intermediate · Course · 1 - 3 Months