Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Architecture Review, Security Testing, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Vulnerability Scanning, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Kubernetes, Application Security, Cloud Infrastructure, Cloud Applications, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Network Security, Cryptography, Threat Management, Information Systems Security, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Security Controls, Cybersecurity, Security Awareness, AI Security, Encryption, Cryptography, Security Strategy, Computer Security Awareness Training, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Cryptographic Protocols
Beginner · Course · 1 - 3 Months

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Encryption, Information Systems Security, Threat Modeling, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Threat Management, Application Security, Data Security, Computer Security, Security Management, Network Security, Incident Response, Data Encryption Standard, Cyber Security Policies, Cryptography, Intrusion Detection and Prevention, Security Controls, Data Integrity, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Cyber Operations, Malware Protection, Network Protocols, Security Testing, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP)
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Network Monitoring, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Exploitation techniques, Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Continuous Monitoring, Secure Coding, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration, Incident Response
Intermediate · Specialization · 3 - 6 Months