
Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: White-Box Testing, Software Testing, Risk Analysis, Code Coverage, Test Case, Test Tools, Test Planning, Risk Management, Software Quality Assurance
★ 3.4 (8) · Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Cyber Attacks, Information Systems Security, Application Security, OSI Models, Cryptography, Data Security, Cryptographic Protocols, Encryption, Network Administration, Infrastructure Security, Endpoint Security, General Networking, Security Controls, Malware Protection, Cloud Computing, Wireless Networks, Network Protocols
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Network Protocols, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Key Management, Wireless Networks
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security
★ 4.6 (11) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Security Testing, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Cloud Computing
★ 4.8 (8) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Security, Firewall, Ansible, Network Performance Management, Network Infrastructure, Network Protocols, Security Controls, Event Monitoring, Puppet (Configuration Management Tool), IT Automation, Chef (Configuration Management Tool), Real Time Data, JSON, Automation, Identity and Access Management, Restful API, Application Programming Interface (API)
★ 4.7 (6) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Vulnerability Scanning, Public Cloud
Intermediate · Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, User Provisioning, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Virtual Networking, User Accounts
★ 4.8 (67) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Federal Information Security Management Act, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, System Monitoring, Security Requirements Analysis, System Implementation, Change Requests, Cyber Security Assessment, Security Testing, Risk Mitigation, Document Management
★ 4.8 (12) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Apple iOS, Role-Based Access Control (RBAC), Vulnerability Assessments, iOS Development, Software Testing, Development Testing, Authentications, Unit Testing, Application Security, Security Testing, Secure Coding, Identity and Access Management, Knowledge of Apple Software, Software Quality (SQA/SQC), Verification And Validation, Debugging, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Exploitation techniques, Data Sharing
★ 4.7 (267) · Beginner · Course · 1 - 3 Months