
Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Cyber Attacks, Cybersecurity, Identity and Access Management, Authentications, Security Controls, Threat Management, Data Security, Information Privacy, Cyber Risk, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Information Technology, Security Software, Malware Protection, Data Security, Encryption, Security Awareness, Endpoint Security, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google App Engine, Authentications, Application Deployment, Cloud Deployment, Identity and Access Management, Google Cloud Platform, Cloud Applications, Authorization (Computing), User Accounts, Cryptography, Python Programming
Beginner · Project · Less Than 2 Hours

Coursera
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Management, Security Controls, Cyber Security Strategy, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Enterprise Security, Information Assurance, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, IT Security Architecture, Information Systems Security, Local Area Networks, Cyber Attacks, Computer Security, Linux Commands, Windows PowerShell, Security Controls, Hardening, Vulnerability Scanning, Endpoint Security, Threat Detection, Linux, Network Architecture, Wireless Networks, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Security, Mobile Security, System Monitoring, Network Monitoring, Security Controls, Internet Of Things, Wireless Networks, Application Security, Information Systems Security, Authorization (Computing), Cybersecurity, Identity and Access Management, Cyber Attacks, General Networking, Authentications, Cloud Security, TCP/IP, Network Protocols, Cloud Services, Cloud Platforms
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Advanced Encryption Standard (AES), Cryptographic Protocols, Application Security, Key Management, Secure Coding, Data Security, Web Development, Email Security, PHP (Scripting Language), Intrusion Detection and Prevention, Data Integrity, Algorithms, User Provisioning, Command-Line Interface
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Infrastructure Security, Ansible, Network Infrastructure, General Networking, IT Automation, Security Controls, Wireless Networks, Identity and Access Management, Cryptographic Protocols, Authorization (Computing), Scripting, Authentications, Automation, Scripting Languages, Encryption, Data Modeling
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks