
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Network Security, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Starweaver
Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Security Testing, Application Security, Continuous Monitoring, Software Testing, Development Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, Test Automation, Secure Coding, Code Review, Vulnerability Management, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Risk Analysis, Communication, Malware Protection, Application Security, Infrastructure Security, Analysis
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Test Script Development, Brute-force attacks, Cloud Security, Network Analysis, API Testing, General Data Protection Regulation (GDPR), Wireless Networks, Security Controls
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Scripting, Android (Operating System), Human Factors (Security), Command-Line Interface, Network Analysis, Automation, Virtual Environment
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Code Coverage, Embedded Software, Real-Time Operating Systems, Performance Testing, System Testing, Software Testing, Verification And Validation, Embedded Systems, Test Case, Test Planning, Integration Testing, Simulations, Real Time Data, Safety and Security
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Vulnerability Assessments, Mobile Security, Open Web Application Security Project (OWASP), Cloud Security, Threat Modeling, Infrastructure Security, Application Security, Network Security, Scripting, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Security Controls, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, AI Security, Vulnerability Assessments, Exploitation techniques, Test Planning
Intermediate · Course · 1 - 3 Months