
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

DeepLearning.AI
Skills you'll gain: LLM Application, Prompt Engineering, Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, AI Security, Application Security, Risk Management Framework
★ 4.8 (58) · Beginner · Project · Less Than 2 Hours
Skills you'll gain: Mobile Security, AI Security, Exploitation techniques, Threat Detection, Security Controls, Intrusion Detection and Prevention, Threat Modeling, Hardening, AI literacy, Malware Protection, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Prompt Engineering, Human Factors (Security), Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Case Studies, Fraud detection, Project Design, Project Risk Management, Ethical Standards And Conduct, Law, Regulation, and Compliance, Scalability, Content Strategy, Quality Assessment, Keyword Research, Search Engine Optimization, Content Creation
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)
★ 4.4 (66) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
★ 4.9 (19) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (6) · Beginner · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptographic Protocols, Public Key Cryptography Standards (PKCS), Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Cyber Attacks, Encryption, Key Management, Multi-Factor Authentication, Single Sign-On (SSO)
★ 4.7 (710) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Event Monitoring, Exploit development, Cyber Security Assessment, Payment Systems, Continuous Monitoring, Blockchain, Incident Response, Vulnerability Scanning, Security Architecture Review, Patch Management, Code Review, Incident Management, Application Deployment, Authorization (Computing), Data Validation
★ 4.8 (30) · Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Google Cloud Platform, Continuous Monitoring, Application Security, Vulnerability Management, Threat Management, Data Security, Security Controls, System Monitoring, Event Monitoring, Security Management, Infrastructure Security, Threat Detection
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers
★ 4.7 (13) · Intermediate · Course · 1 - 3 Months