
Universitat Politècnica de València
Skills you'll gain: Cybersecurity, Cyber Attacks, Computer Security Awareness Training, Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Security Awareness, Data Security, Personally Identifiable Information, Email Security, Cyber Risk, Malware Protection, General Data Protection Regulation (GDPR), Information Privacy, Multi-Factor Authentication, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Scanning, Vulnerability Assessments, Application Security, Authentications, Wireless Networks, Network Security, Linux, Encryption
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Network Security, Intrusion Detection and Prevention, Computer Security Incident Management, Command-Line Interface, Cryptography, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cybersecurity, Encryption, Information Systems Security, Vulnerability Assessments, Metasploit, Risk Management Framework, Multi-Factor Authentication, Cloud Security, Penetration Testing, Risk Management
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: IT Security Architecture, Information Systems Security, Network Security, Computer Security, Application Security, Cybersecurity, Security Awareness, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Identity and Access Management, Threat Detection, Hardening, Malware Protection, Wireless Networks
Beginner · Course · 1 - 3 Months

Skills you'll gain: Operating System Administration, Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, System Support, Information Technology Operations, Wireless Networks, Network Security, Desktop Support, Information Systems Security, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
Beginner · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Application Security, Information Privacy, Cyber Governance, Infrastructure Security, Cryptography, Threat Modeling, Business Continuity Planning, OSI Models, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, Cyber Security Strategy, ISO/IEC 27001, Network Security, Malware Protection, Data Collection, Data Analysis
Earn a degree
Degree · 1 - 4 Years

Skills you'll gain: Version Control, GitHub, User Accounts, Role-Based Access Control (RBAC), Git (Version Control System), .NET Framework, Identity and Access Management, Database Management, Object-Relational Mapping, Authorization (Computing), Microsoft Windows, Database Application, Microsoft Development Tools, Application Design, Application Development, C# (Programming Language), Software Design, Authentications, User Interface (UI)
Intermediate · Course · 1 - 4 Weeks