
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Network Security, Network Administration, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, General Networking, Cyber Security Assessment, Network Protocols, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, System Monitoring, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Cloud Computing, Threat Detection
Beginner · Course · 1 - 3 Months

Simplilearn
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Cyber Attacks, Threat Detection, Exploitation techniques, Malware Protection, Security Awareness, SQL, Databases
Beginner · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Security Management, Event Monitoring, Disaster Recovery, Incident Management, Threat Detection, Cloud Security, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management, Google Cloud Platform
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Data Security, Security Management, Vulnerability Management, Firewall, Vulnerability Assessments, Vulnerability Scanning, Key Management, User Provisioning, Role-Based Access Control (RBAC), Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: DevSecOps, AI Security, IT Security Architecture, Cyber Operations, AI Integrations, Exploit development, Incident Response, AI literacy, Zero Trust Network Access
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Business Continuity, Contingency Planning, Cyber Threat Intelligence, Threat Detection, Crisis Management, Cyber Attacks, Security Awareness, Regulatory Compliance, Risk Analysis, Compliance Management, Regulatory Requirements, Business Analysis, Digital Forensics
Intermediate · Course · 1 - 4 Weeks