
Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Mobile Security, AI Security, Exploitation techniques, Threat Detection, Security Controls, Intrusion Detection and Prevention, Threat Modeling, Hardening, AI literacy, Malware Protection, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Prompt Engineering, Human Factors (Security), Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Network Security, Exploit development, Vulnerability Scanning, Security Testing, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Command-Line Interface, Linux Administration, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration
★ 4.8 (13) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation
★ 4.9 (30) · Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Management, Cyber Security Assessment, Security Controls, Cyber Attacks, Cyber Threat Intelligence, Information Systems Security, Regulatory Compliance, Financial Regulation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Security Testing, Application Security, Hardening, Data Security, Data Access, Exploitation techniques, Application Frameworks, Application Development, Data Validation, Development Environment
Intermediate · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Data Security, Security Management, Vulnerability Management, Firewall, Vulnerability Assessments, Vulnerability Scanning, Key Management, User Provisioning, Role-Based Access Control (RBAC), Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Scripting Languages
★ 4.6 (97) · Intermediate · Course · 1 - 4 Weeks