
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
★ 4.7 (178) · Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Requirements Analysis, Risk Management Framework, Risking, Scalability, Software Visualization
★ 4.6 (113) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, OSI Models, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, TCP/IP, Network Administration, Wireless Networks, Network Protocols, General Networking, Telecommunications, Intrusion Detection and Prevention, Network Routers, Security Controls, Identity and Access Management, Mobile Security, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cryptography, Encryption, Data Security, Cryptographic Protocols, Data Integrity, Key Management, Digital Communications
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
★ 4.8 (45) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Cyber Security Strategy, MITRE ATT&CK Framework, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Threat Hunting, IT Security Architecture, Cyber Security Strategy, Threat Detection, Network Security, Security Information and Event Management (SIEM), Security Management, MITRE ATT&CK Framework, Security Controls, Incident Response, Vulnerability Assessments, Cloud Security, Vulnerability Management, Vulnerability, Encryption, Configuration Management
★ 4.3 (9) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Embedded Software, Security Engineering, Hardening, Embedded Systems, Information Systems Security, Security Controls, Network Security, Threat Modeling, Cybersecurity, Encryption, System Configuration, Federal Information Security Management Act, Linux, Hardware Architecture, Data Storage Technologies, Cryptography, Key Management, File Systems, Computer Hardware, Package and Software Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Digital Forensics, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Incident Management, Investigation, Business Continuity, Cybersecurity, Resource Management, Resource Allocation, Prioritization, Resource Planning, Business Analysis, Data Loss Prevention, Law, Regulation, and Compliance, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Infrastructure Security, Cloud Deployment, Cloud Computing, Threat Detection, Cyber Attacks, Endpoint Detection and Response, Cybersecurity, Information Systems Security, Virtualization, Virtualization and Virtual Machines, Virtual Machines, Security Controls, Intrusion Detection and Prevention, Data Security, Human Factors (Security)
★ 4.7 (34) · Beginner · Course · 1 - 4 Weeks