
Packt
Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Network Security, Brute-force attacks, TCP/IP, Network Monitoring, Vulnerability Assessments, Servers, Network Analysis, Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Security Awareness, Change Control, Computer Security Awareness Training, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Data Ethics, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: OSI Models, Network Security, Security Controls, Wireless Networks, Network Protocols, Firewall, Network Administration, TCP/IP, Telecommunications, Proxy Servers, Distributed Denial-Of-Service (DDoS) Attacks, Network Infrastructure, Intrusion Detection and Prevention, Remote Access Systems, Authentications
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: System Programming, Embedded Software, Linux, Embedded Systems, Debugging, Operating Systems, Peripheral Devices, Build Tools, Shell Script, File Systems, USB, Development Environment, C (Programming Language)
Advanced · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

University of London
Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: OSI Models, TCP/IP, Network Protocols, Linux, Dynamic Host Configuration Protocol (DHCP), Virtual Networking, Network Analysis, Linux Administration, Virtual Machines, General Networking, Linux Commands, System Configuration, Network Architecture, Computer Networking, Command-Line Interface, Software Installation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Application Security, Angular, OAuth, Test Driven Development (TDD), Cryptography, Web Components, Data Validation, Vue.JS, Data Security, Authentications, HTML and CSS, Encryption, Authorization (Computing), General Data Protection Regulation (GDPR), Web Development, Web Applications, JavaScript Frameworks, Javascript, Security Strategy, Computer Programming
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption
Beginner · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Incident Response, Security Controls, Computer Security Incident Management, Health Information Management, Data Security, Cyber Risk, Personally Identifiable Information, Regulatory Compliance, Risk Management, Threat Management, Data Management, Threat Modeling, Cybersecurity, ISO/IEC 27001, Compliance Management, Continuous Monitoring
Advanced · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months