
Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: System Configuration, Configuration Management, Cyber Operations, Cybersecurity, Security Awareness, Computer Security Awareness Training, Data Security, Security Controls, Security Management, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Network Administration, IT General Controls (ITGC), Cyber Security Policies, Information Technology Operations, System Monitoring, Patch Management, Cryptography
★ 4.7 (205) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Strategy
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Identity and Access Management, Cloud Computing, User Provisioning, Security Controls, Cloud Management, Malware Protection, Cloud Infrastructure, Cloud Security, Security Engineering, Authorization (Computing), Network Security, Hardening, Cryptographic Protocols, Cybersecurity
★ 4.5 (658) · Beginner · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Computer Security Incident Management, Continuous Monitoring, Incident Response, Security Awareness, Security Management, Malware Protection, Network Security, Network Analysis, Network Monitoring
★ 4.8 (40) · Mixed · Course · 1 - 4 Weeks

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, IT Security Architecture, Cloud Standards, Security Controls, Security Testing, Hybrid Cloud Computing, Multi-Cloud, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Containerization, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Threat Detection, Web Applications, Malware Protection, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Digital Forensics
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Threat Modeling, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Code Review, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Security Testing, Threat Modeling, Vulnerability Scanning, Vulnerability Assessments, AI Personalization, Continuous Integration, Open Source Technology, CI/CD, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Management, Security Controls
★ 4.9 (9) · Intermediate · Course · 1 - 4 Weeks