
Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cybersecurity, Malware Protection, Cyber Attacks, Network Security, Information Systems Security, Intrusion Detection and Prevention, Security Testing, Penetration Testing, Firewall, Threat Detection, Internet Of Things, Exploitation techniques, Network Analysis
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Business Risk Management, Risk Management, Cyber Governance, Penetration Testing, Personally Identifiable Information, Information Privacy, Vendor Management, Governance Risk Management and Compliance, Security Management, Cyber Risk, Vulnerability Assessments, Cyber Security Policies, Security Strategy, Compliance Management, Cybersecurity, Regulatory Requirements, Security Controls, Security Awareness
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, IT Management, Cybersecurity, Vulnerability Management, Exploitation techniques, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Human Factors (Security), Application Servers, Web Servers, Web Applications
Beginner · Course · 1 - 4 Weeks

DeepLearning.AI
Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Large Language Modeling, Vulnerability Management, Risk Management Framework
Beginner · Project · Less Than 2 Hours

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cyber Security Assessment, Cybersecurity, Data Ethics, Computer Networking, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Security Requirements Analysis, Solution Architecture, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Mobile Security, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Cybersecurity, Exploit development, Application Security, Exploitation techniques, Cyber Attacks, Cloud Computing, Cryptography, Vulnerability Scanning, Virtualization, Network Security, Encryption, Data Security, SQL
Intermediate · Course · 1 - 4 Weeks