
Board Infinity
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Brute-force attacks, General Networking, Network Administration, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Intermediate · Guided Project · Less Than 2 Hours
Coursera
Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Requirements Elicitation, Business Analysis, Backlogs, Requirements Management, Stakeholder Engagement, Business Process, User Story, Business Requirements, Requirements Analysis, Business Modeling, Business Risk Management, Business Intelligence, Business Strategies, Financial Analysis, Performance Measurement, Business Process Modeling, Systems Analysis, Root Cause Analysis, Business Planning, Stakeholder Analysis
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Field-Programmable Gate Array (FPGA), Hardware Design, Electronic Hardware, Laboratory Experience, Application Specific Integrated Circuits, Embedded Software, Systems Design, Embedded Systems, Electronics Engineering, Electronic Systems, Electrical and Computer Engineering, Test Case, Verification And Validation, Engineering Documentation, Debugging, Computer Architecture, Software Development, Software Development Tools, Integrated Development Environments, Hardware Architecture
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Authentications, Application Deployment, Operating System Administration, Azure Active Directory, Windows PowerShell, Group Policy, Enterprise Application Management, Identity and Access Management, Cloud Applications, Enterprise Security, Mobile Security, System Configuration, Security Management, Microsoft Azure, User Provisioning, Android (Operating System), Patch Management
Intermediate · Specialization · 1 - 3 Months

Logical Operations
Skills you'll gain: File I/O, Cross Platform Development, Operating Systems, Data Import/Export, Development Environment, Scripting, File Management, Scripting Languages, Data Processing, Virtual Machines, Python Programming, Programming Principles, Computer Programming, Software Development
Mixed · Course · 1 - 4 Weeks