
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Responsible AI, Social Media Management, Social Media, Social Media Marketing, Google Ads, Digital Marketing, Email Marketing, Social Media Strategy, Digital Advertising, Web Analytics and SEO, Online Advertising, Social Media Campaigns, Digital Media Strategy, Paid media, Pay Per Click Advertising, Content Creation, Customer Retention, Search Engine Optimization, Presentations, Generative AI
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Data Persistence, Risk Analysis
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Exploitation techniques, Cloud Security, Vulnerability Scanning, Cyber Security Assessment, Network Security, Application Security, Vulnerability Assessments, Cybersecurity, Mobile Security, Human Factors (Security), Network Analysis, Scripting, Virtual Machines, Linux, Technical Communication
Advanced · Course · 3 - 6 Months

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cryptographic Protocols, Cryptography, Exploit development, Amazon Web Services, Infrastructure Security, Cyber Security Strategy, Amazon Elastic Compute Cloud, Application Security, Cloud Computing, Email Security, Public Key Infrastructure, Containerization, SQL
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, General Data Protection Regulation (GDPR), Responsible AI
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks