The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
Intermediate · Course · 1 - 3 Months

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, IT Security Architecture, Network Security, Internet Of Things, Threat Detection, Cloud Security, Infrastructure Security, Vulnerability Management, Identity and Access Management, Information Systems Security, Encryption, Incident Response, Security Engineering, Threat Management, Cybersecurity, Security Controls, Penetration Testing, Vulnerability Assessments, Cloud Solutions, Data Security
Intermediate · Specialization · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Exploitation techniques, Penetration Testing, Open Web Application Security Project (OWASP), Proxy Servers, Security Testing, Vulnerability Assessments, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Penetration Testing, Technical Communication, Scripting, Technical Writing, Automation, Technical Consulting, Security Controls
Intermediate · Course · 1 - 4 Weeks

L&T EduTech
Skills you'll gain: Laboratory Testing, Test Engineering, Laboratory Experience, Civil Engineering, Environmental Monitoring, Engineering Analysis, Virtual Environment, Experimentation, Research Reports, Structural Analysis, Analytical Testing, Construction, Engineering Practices, Penetration Testing, Engineering Calculations, Data Analysis Software, Technical Standard
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks