The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Blockchain, Secure Coding, Penetration Testing, Front-End Web Development, Application Development, Security Testing, Web Development Tools, Application Security, Development Environment, Web Development, Software Development Tools, Cyber Security Assessment, JavaScript Frameworks, Payment Systems, Transaction Processing, Authorization (Computing), User Interface (UI), Authentications, Application Deployment, Programming Principles
Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Malware Protection, Email Security, Exploitation techniques, Network Security, Fraud detection, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Operating System Administration, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Threat Management, General Networking, Windows PowerShell, Cyber Governance, Unix Commands
Beginner · Specialization · 1 - 3 Months

Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Linux, Cybersecurity, Operating System Administration, Operating Systems, Windows PowerShell, Unix Commands, Microsoft Windows, Computer Systems, Mac OS
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Open Web Application Security Project (OWASP), Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Security Testing, Prompt Engineering, Application Security, Automation
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Exploitation techniques, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy
Intermediate · Course · 1 - 4 Weeks
Gain the knowledge and skills you need to advance.

This role has a $119,168 median salary ¹.

A Cyber Security Specialist monitors systems, responds to incidents, enforces policies, and protects data from unauthorized access and cyber threats.
This role has a $119,168 median salary ¹.
Offered by



This role has a $116,480 median salary ¹.

A Cyber Security Analyst monitors IT systems, analyzes threats, finds vulnerabilities, and implements measures to protect data from cyber attacks.
This role has a $116,480 median salary ¹.
Offered by




Build toward a degree
Professional Certificate

Professional Certificate

Microsoft
Professional Certificate

Specialization

Multiple educators
Professional Certificate

Build toward a degree
Professional Certificate

Microsoft
Professional Certificate

Professional Certificate

Professional Certificate


Course

EC-Council
Professional Certificate