
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Vulnerability Management, Google Cloud Platform, Infrastructure Security, Threat Detection, Security Controls, Data Security, Cloud API, Malware Protection, Email Security, Continuous Monitoring
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Architecture Review, Data Management, Cyber Security Assessment, IT Security Architecture, Event Monitoring
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Cyber Security Assessment, General Networking, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, AI Security, LLM Application, Test Script Development, Scripting, Scripting Languages, Python Programming
★ 4.3 (7) · Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Computer Security, Authentications, Cryptography, Information Assurance, Cyber Security Policies, Authorization (Computing), Security Software, Security Controls, Cyber Security Assessment, Information Privacy, Encryption, Data Access, Security Awareness, Risk Analysis, Problem Solving, Communication
★ 3.6 (30) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Systems Development Life Cycle, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Security Management, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft SQL Servers, Data Security, Microsoft Azure, Cloud Security, Databases, Database Management, Data Management, Data Access, Security Controls, Authorization (Computing), Role-Based Access Control (RBAC)
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Security Controls, Data Security, Endpoint Security, Cryptography, Authentications, Query Languages, Computer Programming
★ 4.4 (9) · Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Application Security, Secure Coding, Security Software, Vulnerability Scanning, Security Controls, Intrusion Detection and Prevention, Security Awareness, Web Applications, PHP (Scripting Language), Application Frameworks, Browser Compatibility, Computer Programming
★ 5 (7) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Vulnerability Management, Security Testing, Penetration Testing, Security Awareness, Security Strategy, DevOps, Security Management, Computer Security Awareness Training, Technology Roadmaps, Risk Management Framework
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Android Development, Key Management, Exploit development, Android (Operating System), Secure Coding, Mobile Security, Data Security, Application Security, Data Loss Prevention, Network Security, Exploitation techniques, Memory Management, File Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Attacks, Network Architecture, Cloud Computing, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Network Security, Cloud Deployment, Application Security, Infrastructure Security, AI Security, Security Strategy, IT Automation, Mobile Security
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months