The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

Duke University
Skills you'll gain: Blockchain, Loans, FinTech, Lending and Underwriting, Cyber Risk, Operational Risk, Scalability, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, Financial Inclusion, Legal Risk, Exploit development, Derivatives, Key Management, Cryptography, Finance, Entrepreneurial Finance, Entrepreneurship
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Exploit development, Penetration Testing, Cybersecurity, Ansible, Malware Protection, Incident Response, Infrastructure Security, Infrastructure as Code (IaC), Terraform, Cloud Computing, Virtualization, Virtual Machines, Amazon Web Services, Linux
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Computer Architecture, Excel Macros, Linux, File Management
Intermediate · Course · 1 - 3 Months

AI CERTs
Skills you'll gain: Threat Modeling, Security Testing, Security Engineering, Cybersecurity, Data Security, Blockchain, Threat Detection, Cryptography, Network Security, Security Strategy, Exploit development, Vulnerability Assessments, Transaction Processing, Regulation and Legal Compliance
Advanced · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security
Beginner · Specialization · 3 - 6 Months