
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Linux Servers, Linux Commands, Network Administration, Cryptography, User Accounts, Key Management, Brute-force attacks
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Cloud Computing, Cloud Computing Architecture, Cloud Services, Cloud Deployment, Security Architecture Review, Threat Modeling, Application Security, Cloud Infrastructure, Network Security, Threat Management, Cloud Platforms, Infrastructure As A Service (IaaS), Security Requirements Analysis, Threat Detection, Cyber Threat Intelligence, Enterprise Architecture, Platform As A Service (PaaS)
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
★ 4.8 (12) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Endpoint Security, Zero Trust Network Access, Application Security, Security Strategy, Hardening, Microsoft Servers, Data Security, Security Management, Vulnerability Scanning, Patch Management
Advanced · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: C and C++, Exploit development, C (Programming Language), Security Testing, C++ (Programming Language), Secure Coding, Application Security, System Programming, Debugging, Vulnerability Assessments, Interoperability, White-Box Testing
★ 2.7 (7) · Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Remote Access Systems, Security Management, Data Security, Law, Regulation, and Compliance, Cybersecurity, Vulnerability Management, Computer Security Awareness Training, Incident Response, Security Software, Incident Management, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation, Human Factors
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Vulnerability Scanning, Public Cloud
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: System Configuration, Security Controls, Hardening, Data Security, Authentications, Multi-Factor Authentication, User Accounts
Intermediate · Project · Less Than 2 Hours

Packt
Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure, Network Security, Endpoint Detection and Response, Network Architecture, General Networking, Endpoint Security, Continuous Monitoring, Malware Protection, System Monitoring, Incident Response, Email Security, Anomaly Detection, Operating Systems, Identity and Access Management
★ 4.9 (7) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Knowledge of Apple Software, Apple Service Certification, Application Lifecycle Management, Endpoint Security, Knowledge of Apple Hardware, Release Management
Advanced · Course · 1 - 3 Months