Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Digital Forensics, Risk Management, Personally Identifiable Information, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Enterprise Risk Management (ERM), Business Risk Management, Security Information and Event Management (SIEM), Security Strategy
Beginner · Specialization · 1 - 3 Months

Packt
Skills you'll gain: Vulnerability Scanning, Cyber Security Assessment, Active Directory, Web Applications, Brute-force attacks, Microsoft Windows, Cryptographic Protocols, Bash (Scripting Language), Command-Line Interface, Shell Script, Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: User Accounts
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming
Advanced · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging
Advanced · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking
Intermediate · Course · 1 - 3 Months