
Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Cyber Attacks, Network Architecture, Cloud Computing, Threat Management, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Cloud Deployment, Application Security, Infrastructure Security
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Threat Modeling, Remote Access Systems, Vulnerability Assessments, Threat Detection, Security Strategy, Cyber Security Assessment, Cybersecurity, Security Software, Security Management, Infrastructure Security, Telecommuting, Cyber Risk, Cyber Attacks, Security Awareness, Security Controls, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Hardening, Network Protocols, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Key Management, Wireless Networks
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Security Testing, Cybersecurity, Vulnerability Assessments, Network Security, Web Applications, SQL
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Information Technology, Security Software, Malware Protection, Data Security, Encryption, Security Awareness, Endpoint Security, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, Proxy Servers, SQL, MySQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Systems Development Life Cycle, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Security Management, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Exploitation techniques, Data Sharing
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months