
Google Cloud
Skills you'll gain: Kubernetes, Threat Modeling, Hardening, Verification And Validation, Google Cloud Platform, Security Controls, Vulnerability Assessments, Cloud Computing
Advanced · Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Test Script Development, Technical Communication, Scripting, Technical Writing, Automation, Technical Consulting, Security Controls
Intermediate · Course · 1 - 4 Weeks

United Cities and Local Governments of Africa
Skills you'll gain: Climate Change Adaptation, Climate Change Programs, Climate Change Mitigation, Environmental Policy, Environmental Issue, Social Determinants Of Health, Community Development, Environmental Resource Management, Sustainable Development, Decision Support Systems, Governance, Vulnerability
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Awareness, Cyber Attacks, Brute-force attacks, MITRE ATT&CK Framework, Encryption, Vulnerability Scanning, Exploitation techniques, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Risk Mitigation, Security Management, Security Strategy, Infrastructure Security, Digital Forensics
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Technical Communication, Intrusion Detection and Prevention, Cybersecurity, Vulnerability Management, Continuous Monitoring, Threat Management, Communication Strategies, Digital Forensics, Root Cause Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Test Script Development, Brute-force attacks, Cloud Security, Network Analysis, API Testing, General Data Protection Regulation (GDPR), Wireless Networks, Security Controls
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, White-Box Testing, Threat Detection, Threat Modeling
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL
Intermediate · Course · 1 - 4 Weeks