
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Brute-force attacks, Vulnerability Assessments, Information Systems Security, Data Persistence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Endpoint Security, IT Security Architecture, Information Technology, Data Security, Network Security, Cloud Security, Information Privacy, Firewall, Cybersecurity, Linux, System Configuration, Security Controls, Cyber Threat Intelligence, Cyber Security Strategy, Microsoft Windows, Identity and Access Management, Risk Management Framework, Encryption, Good Clinical Practices (GCP)
Beginner · Course · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Patch Management, Cyber Risk, Continuous Monitoring, Threat Detection, Cyber Threat Hunting, Application Security, Security Controls, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Network Security, Cyber Security Strategy, Network Engineering, Web Applications
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Management, Security Information and Event Management (SIEM), Penetration Testing, Vulnerability Assessments, Cybersecurity, Intelligence Collection and Analysis, Vulnerability Scanning, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Analysis, Network Analysis, Auditing, Data Analysis, Linux Commands, Data Collection, Correlation Analysis, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: White-Box Testing, Software Testing, Risk Analysis, Code Coverage, Test Case, Unit Testing, Test Engineering, Test Planning, Integration Testing
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Virtual Networking, Security Management, Cyber Security Assessment, System Configuration, Simulations, Configuration Management, Cybersecurity, Cloud Security
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours