
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, CI/CD, Cloud Platforms, Vulnerability Assessments, Vulnerability Management, Penetration Testing, Cybersecurity, Configuration Management
Intermediate · Course · 3 - 6 Months

Packt
Skills you'll gain: Open Web Application Security Project (OWASP), Exploit development, Exploitation techniques, Internet Of Things, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Test Tools, USB, Embedded Systems, Network Security, Test Equipment, General Networking, Serial Peripheral Interface
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Data Encryption Standard, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Secure Coding, Cryptography, File I/O, Python Programming, Programming Principles, Debugging, Scripting, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Penetration Testing, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Threat Modeling, Threat Management, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Event Monitoring, Security Testing, Generative AI, Embeddings, System Monitoring, LangGraph, Prompt Engineering, Vector Databases
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months