
Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

Packt
Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing
Beginner · Course · 3 - 6 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Intermediate · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Threat Modeling, Threat Detection, Intrusion Detection and Prevention, Cryptographic Protocols, Cybersecurity, Brute-force attacks, Cyber Threat Intelligence, Cryptography, Endpoint Detection and Response, Exploitation techniques, Cyber Security Strategy, Cyber Attacks, Security Awareness, Security Controls, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Brute-force attacks, Encryption, Network Security, Cybersecurity, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Data Security, Cyber Attacks, Drupal, Mac OS, Linux, Blockchain
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Cybersecurity, Cyber Operations, Information Systems Security, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploit development, Exploitation techniques, Cyber Attacks, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Security Controls, Information Systems Security, Security Management, Information Systems Security Assessment Framework (ISSAF), Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Ethical Standards And Conduct, SQL
Build toward a degree
Beginner · Course · 1 - 4 Weeks