
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Microsoft
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), Authentications, Authorization (Computing), Microsoft Copilot, Application Security, Data Validation, Web Applications, Security Controls, Vulnerability Assessments, Data Security, Data Integrity, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Network Analysis, Operating Systems
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Encryption, Secure Coding, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Scripting, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Vulnerability Scanning, Network Protocols, Brute-force attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Linux Commands
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Web Development, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL, Command-Line Interface, Data Structures
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Computer Networking, Network Protocols, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months