
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Network Security, Configuration Management, System Configuration, Vulnerability Assessments, Firewall, Linux Commands, Servers, TCP/IP, Network Analysis, Software Versioning
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Risk Management, Secure Coding, Cyber Security Assessment, Security Testing, Cyber Governance, Risk Management Framework, Threat Management, Software Development Life Cycle, Application Security, Cyber Security Policies, Threat Detection, Security Management, Security Controls, Systems Development, Security Strategy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Public Key Infrastructure, Network Monitoring, Encryption, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Local Area Networks, Virtual Local Area Network (VLAN), Network Switches, Authentications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Vulnerability Assessments, Test Tools, Web Applications, SQL, Databases
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Computer Security Awareness Training, Information Systems Security, Malware Protection, Data Security, Technical Support and Services, Encryption, Security Awareness, Authentications, Patch Management, Technical Support, Firewall, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Infrastructure, Network Performance Management, Authentications, Identity and Access Management, Encryption, Virtual Local Area Network (VLAN), Multi-Factor Authentication, Wireless Networks
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Microsoft Intune (Mobile Device Management Software), Network Security, Cybersecurity, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Application Security, Exploitation techniques, Web Applications, Cloud Security, Internet Of Things
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Brute-force attacks, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months