
Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Security Awareness, Information Privacy, Emerging Technologies
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Network Security, Multi-Factor Authentication
Beginner · Course · 1 - 3 Months
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming
Intermediate · Course · 1 - 4 Weeks

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Application Security, Threat Detection, Information Systems Security, Network Security, Computer Security, Encryption
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Cybersecurity, Network Protocols, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Data Security, Security Testing, Data Ethics, Cyber Security Strategy, Cyber Threat Intelligence, Security Controls, Cyber Risk, Data Sharing, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Cyber Threat Hunting, Cyber Governance, Security Management, Artificial Intelligence and Machine Learning (AI/ML), Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI
Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Virtual Networking, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months