
Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
Advanced · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Data Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Cryptographic Protocols, Encryption, Public Key Infrastructure, Key Management, Transaction Processing, Authentications, FinTech, Data Security, Information Privacy, Emerging Technologies, Data Integrity, Distributed Computing
Beginner · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Blockchain, Key Management, Public Key Infrastructure, Cryptography, Application Security, Encryption, Secure Coding, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Solution Design, Cyber Governance, Vulnerability Assessments, Code Review, Authorization (Computing), Data Integrity
Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, C (Programming Language), System Programming, Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Cryptography, Encryption, Python Programming, Data Security
Intermediate · Guided Project · Less Than 2 Hours

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, General Networking, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Exploit development, Network Model, Network Routing, Communication Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Security Testing, Network Security, Data Security, Threat Detection, Cryptography, Infrastructure Security, Security Software, Transaction Processing, Malware Protection, Key Management, Scripting, Network Protocols, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months

Simplilearn
Skills you'll gain: Encryption, Cryptography, Data Security, Cybersecurity
Beginner · Course · 1 - 4 Weeks