
Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
★ 4.7 (15) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, Proxy Servers, SQL, MySQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Operations, Vulnerability Scanning, Cyber Attacks, Computer Security, Vulnerability Assessments, Security Strategy, Cyber Security Policies, Network Security, Network Analysis, Network Protocols
★ 4.8 (14) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Cybersecurity, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Data Mapping, Software Testing, Data Structures
★ 4.8 (13) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Cybersecurity, AI Security, Data Persistence, Incident Management, Technical Communication, Risk Analysis
★ 4.9 (11) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Virtual Local Area Network (VLAN), Computer Displays, Peripheral Devices, TCP/IP, Display Devices, Local Area Networks, Networking Hardware, Dynamic Host Configuration Protocol (DHCP), General Networking, USB, Wireless Networks, Computer Networking, Network Routers, Network Infrastructure, Hardware Troubleshooting, Network Switches, Network Administration, Network Protocols, Computer Hardware
★ 4.8 (17) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Network Security, Intrusion Detection and Prevention, Hardening, Local Area Networks, Threat Detection, General Networking, Vulnerability Management, System Configuration, Linux Administration, Authentications, Software Installation, Virtual Machines, Network Analysis, Virtualization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Endpoint Security, Cybersecurity, Information Systems Security, Infrastructure Security, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Data Security, Encryption
Intermediate · Course · 1 - 4 Weeks