The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Assessments, Wireless Networks, Network Security, Linux Commands, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Coursera Instructor Network
Skills you'll gain: Artifactory, Application Security, Application Deployment, Vulnerability Scanning, CI/CD, Package and Software Management, Continuous Integration, DevSecOps, Continuous Deployment, Release Management, Security Testing, Vulnerability Assessments, DevOps, GitHub, Automation
Beginner · Course · 1 - 4 Weeks

University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Peer Review, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Collaborative Software, Control Systems, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Manufacturing Operations, Supply Chain Management, Data Sharing, Manufacturing Processes
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Threat Management, Security Controls, Stakeholder Communications, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL
Beginner · Professional Certificate · 3 - 6 Months

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

Coursera Instructor Network
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Responsible AI, Incident Response, Application Security, Security Engineering, Threat Modeling, Cybersecurity, MLOps (Machine Learning Operations), Security Controls, Information Systems Security, Artificial Intelligence and Machine Learning (AI/ML), Security Strategy, Continuous Monitoring, Identity and Access Management, Cloud Security, Vulnerability Assessments, Hardening, Threat Detection, Artificial Intelligence, Penetration Testing, Machine Learning
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Cryptographic Protocols, Computer Security, Security Testing, Security Engineering, Network Security, Data Security, Infrastructure Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Secure Coding, Network Protocols, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks