
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Endpoint Security, Cybersecurity, Information Systems Security, Infrastructure Security, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Data Security, Encryption
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Management, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Cyber Security Assessment, Application Security, Threat Detection, Security Testing, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Cloud Computing, Exploitation techniques, Web Applications, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Cyber Attacks, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Software Design, Encryption, Vulnerability Management, Security Controls, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring
★ 5 (6) · Intermediate · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Linux Administration, Verification And Validation, Code Review, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Unix, User Accounts, Data Validation, File I/O, Cryptography, File Systems, System Programming, C (Programming Language), Identity and Access Management, Encryption
★ 4.6 (81) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Threat Management, Security Testing, Secure Coding, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Cryptography, CI/CD, Cloud Platforms, DevOps, Vulnerability Assessments, Vulnerability Management, Penetration Testing, Configuration Management
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Exploit development, Penetration Testing, Exploitation techniques, Scripting, Brute-force attacks, Scripting Languages, Shell Script, Python Programming, Program Development, Network Protocols, Data Persistence, Software Installation
★ 4.8 (13) · Advanced · Course · 1 - 3 Months

Skills you'll gain: Legal Risk, Responsible AI, Data Ethics, Generative AI, Personally Identifiable Information, Law, Regulation, and Compliance, AI literacy, Engineering Software, Information Privacy, Regulation and Legal Compliance, Artificial Intelligence, Continuous Monitoring, Case Studies, Diversity Awareness, Ethical Standards And Conduct, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Java Programming, Debugging, Java, Programming Principles, Computer Programming, Algorithms, File I/O, Program Development, Data Structures, Pseudocode, Software Installation, Software Architecture, Integrated Development Environments, Other Programming Languages, Code Reusability, Computational Logic
Beginner · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Responsible AI, AI Security, Data Ethics, Governance, Accountability Frameworks, Data Governance, Law, Regulation, and Compliance, Ethical Standards And Conduct, Legal Risk, Compliance Training, Regulation and Legal Compliance, Artificial Intelligence, Business Ethics, Regulatory Compliance, Compliance Management, Accountability, Regulatory Requirements, AI literacy, Governance Risk Management and Compliance, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cryptographic Protocols, Cyber Security Assessment, Cloud Computing, Data Security, Key Management, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks