
EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: C++ (Programming Language), Object Oriented Programming (OOP), Software Design Patterns, Data Structures, File Systems, Algorithms, Maintainability, Debugging
Intermediate · Course · 1 - 3 Months

Scrimba
Skills you'll gain: Object Oriented Programming (OOP), Python Programming, Data Structures, Computer Programming, Software Engineering, Performance Tuning, File Management, Web Development, Debugging, Web Development Tools
Intermediate · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Big Data, Apache Spark, Data Storage Technologies, Apache Hadoop, Distributed Computing, Data Storage, Data Processing, NoSQL, Apache Kafka, Cloud Computing, Real Time Data, Databases, Analytics, Deep Learning, Scalability, Machine Learning Algorithms, Graph Theory, Machine Learning, Live Streaming
Mixed · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Vanderbilt University
Skills you'll gain: IntelliJ IDEA, Java Programming, Object Oriented Programming (OOP), Java, Integrated Development Environments, Computer Programming, Open Source Technology, Programming Principles, Distributed Computing, Scalability, Functional Design, Algorithms
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: AWS SageMaker, Computer Vision, Applied Machine Learning, Natural Language Processing, Machine Learning, Data Wrangling, Reinforcement Learning, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Amazon CloudWatch, Serverless Computing, CI/CD, Amazon Elastic Compute Cloud, Infrastructure as Code (IaC), Load Balancing, Continuous Deployment, DevOps, AWS Identity and Access Management (IAM), AWS CloudFormation, Cloud Management, Cloud Hosting, Amazon S3, System Monitoring, Application Deployment, API Gateway, Scalability, Enterprise Application Management, Cloud Applications, Cloud Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
Intermediate · Course · 3 - 6 Months