The language used throughout the course, in both instruction and assessments.

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Software Documentation, Test Automation, Generative AI, Software Testing, Vulnerability Scanning, Vulnerability Assessments, Test Case, Security Testing, Secure Coding, Full-Stack Web Development, Technical Documentation, Natural Language Processing
Beginner · Course · 1 - 4 Weeks

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Coursera Project Network
Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Vulnerability Assessments, Vulnerability Scanning, Linux Commands, Command-Line Interface, Virtual Machines
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Computer Architecture
Intermediate · Course · 1 - 3 Months

Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Coursera Project Network
Skills you'll gain: Exploitation techniques, Penetration Testing, Open Web Application Security Project (OWASP), Proxy Servers, Security Testing, Vulnerability Assessments, Web Servers
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks