
Skills you'll gain: Security Testing, Application Security, Open Web Application Security Project (OWASP), Software Testing, Secure Coding, Test Tools, Regression Testing, Unit Testing, Penetration Testing, Security Controls, Computer Security, Test Driven Development (TDD), Debugging, User Acceptance Testing (UAT), Computer Programming, Python Programming, Node.JS, Information Privacy, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Kotlin, Mobile Security, Android (Operating System), Android Development, Open Web Application Security Project (OWASP), Mobile Development, Application Security, Mobile Development Tools, Data Validation, Data Cleansing, Data Security, Application Deployment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Monitoring, Network Administration, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Scripting, System Configuration
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 3 Months