The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Ansible, IT Automation, Enterprise Architecture, DevSecOps, CI/CD, Automation, Red Hat Enterprise Linux, Hardening, Enterprise Security, Devops Tools, Infrastructure as Code (IaC), Patch Management, Security Information and Event Management (SIEM), Vulnerability Scanning, Role-Based Access Control (RBAC), Vulnerability Management, Scalability, Version Control
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Google Cloud
Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Threat Detection, Vulnerability Scanning, Threat Management, Cyber Threat Hunting, Cloud Security, Risk Management Framework, Multi-Cloud, Enterprise Security, Cloud Platforms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Authorization (Computing), Authentications, Azure DevOps, DevSecOps, Security Controls, Performance Tuning, Identity and Access Management, Microsoft Azure, System Monitoring, DevOps, Continuous Monitoring, Role-Based Access Control (RBAC), Personally Identifiable Information, Application Performance Management, Vulnerability Scanning, Azure Active Directory
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Security, Kubernetes, Identity and Access Management, Google Cloud Platform, Key Management, Data Security, Authorization (Computing), Security Controls, Cloud API, Cloud Storage, Application Security, Infrastructure Security, Encryption, Vulnerability Scanning, Authentications, Virtual Machines
Intermediate · Course · 1 - 3 Months

Microsoft
Professional Certificate

Specialization

Palo Alto Networks
Professional Certificate

Akamai Technologies, Inc.
Professional Certificate

Microsoft
Professional Certificate

Professional Certificate

Specialization

Palo Alto Networks
Professional Certificate

Professional Certificate

Specialization

LearnQuest
Specialization

Course