
Packt
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Agile Methodology, Security Management, Cyber Governance, Cyber Security Assessment, Technical Management, Audit Planning, Risk Management Framework, Cyber Risk, Performance Metric, Business Ethics, Law, Regulation, and Compliance, Risk Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Network Security, Exploit development, Vulnerability Scanning, Security Testing, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Cyber Attacks, Command-Line Interface, Linux Administration, Linux Commands, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration
★ 4.8 (13) · Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, DevSecOps, Application Security, Cloud Security, IT Security Architecture, Cloud Standards, Security Controls, Security Testing, Hybrid Cloud Computing, Multi-Cloud, Containerization, Software Development, Continuous Monitoring, Cybersecurity, Supply Chain, Dependency Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Cryptographic Protocols, Infrastructure Security, Information Systems Security, System Configuration, Cryptography, Cloud Computing, Key Management, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, Proxy Servers, SQL, MySQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Cyber Attacks, Encryption, IT Security Architecture, Identity and Access Management, Threat Management, Threat Detection, Firewall, Key Management, Security Management, Infrastructure Security, Security Controls, Network Planning And Design, Authorization (Computing), Public Key Infrastructure, Authentications, Risk Management Framework
★ 4.6 (9) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
★ 4.9 (19) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Vulnerability Scanning, Cyber Attacks, Network Architecture, Cloud Computing, Threat Management, Cloud Infrastructure, Zero Trust Network Access, Cybersecurity, Cyber Security Strategy, Network Security, Cloud Deployment, Application Security, Infrastructure Security
★ 4.7 (6) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security
★ 4.6 (11) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Information Technology, Security Software, Malware Protection, Data Security, Encryption, Security Awareness, Endpoint Security, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging
Mixed · Course · 1 - 4 Weeks