
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Containerization
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Vulnerability Assessments, Human Factors (Security), Network Analysis, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Mobile Security, AI Security, Threat Detection, Security Controls, Exploit development, Threat Modeling, Hardening, Threat Management, Endpoint Security, Artificial Intelligence, Mobile Development Tools, Deep Learning, Incident Response, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Software Testing, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks