Skills you'll gain: Vulnerability Scanning, Digital Forensics, Vulnerability Assessments, Linux, Linux Administration, Network Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Linux Commands, Security Testing, User Accounts, Network Monitoring, System Monitoring, Hardening, Continuous Monitoring, Information Systems Security, Security Controls, Wireless Networks, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Secure Coding, API Testing, API Design, Application Programming Interface (API), Security Testing, Penetration Testing, Application Security, Restful API, Authentications, Exploit development, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Exploitation techniques, Data Security, Business Logic, Authorization (Computing), Scenario Testing, Security Controls, Development Environment, Cybersecurity
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), DevSecOps, Security Testing, CI/CD, DevOps, Application Security, Payment Card Industry (PCI) Data Security Standards, Regulatory Compliance, Devops Tools, Penetration Testing, Law, Regulation, and Compliance, Regulatory Requirements, Compliance Auditing
Intermediate · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Human Factors (Security), Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Interaction Design, User Interface (UI), Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Authentications, OAuth, Threat Management, Software Testing, Development Testing, Software Development Life Cycle, Unit Testing, Security Testing, Unified Modeling Language, Authorization (Computing), Single Sign-On (SSO), Databases, Security Software, Software Development, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity
Intermediate · Course · 3 - 6 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Exploitation techniques, Security Controls, Authentications, Vulnerability Management, Data Validation
Intermediate · Course · 1 - 4 Weeks

Microsoft
Skills you'll gain: Azure Active Directory, Microsoft Azure, Web Applications, Cloud Applications, Application Security, Cloud Security, Identity and Access Management, Authorization (Computing), Key Management, Application Development, Security Strategy, Application Programming Interface (API), Authentications, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, AI Security, DevSecOps, Security Testing, Continuous Monitoring, CI/CD, Threat Detection, DevOps, Continuous Integration, Test Script Development, API Testing, Endpoint Security, Scripting, Unit Testing, Scripting Languages, Exploitation techniques, Integration Testing, Data Validation
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Strategy, Data Security, Security Controls, Cybersecurity, Threat Management, Continuous Monitoring, Encryption, Authentications, Penetration Testing, Data Management
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Operating System Administration, Microsoft Windows, Operating Systems, System Configuration, Firewall, Linux Administration, Linux, System Monitoring, File Systems, System Support, Event Monitoring, Authorization (Computing), File Management, Network Security, Data Security
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Security Engineering, Cryptographic Protocols, Infrastructure Security, Information Systems Security, System Configuration, Cryptography, Cloud Computing, Key Management, Encryption, Mobile Security
Intermediate · Course · 1 - 4 Weeks