
Skills you'll gain: Stakeholder Management, IT Management, Project Management, Project Coordination, Information Technology, Project Risk Management, Agile Project Management, Project Implementation, Project Management Life Cycle, Relationship Management, Agile Methodology, Project Planning, Communication
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Threat Modeling, Information Systems Security, Cybersecurity, Geographic Information Systems
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Responsible AI, Large Language Modeling, IT Security Architecture, Data Ethics, Threat Modeling, Vulnerability Assessments, Security Engineering, Threat Detection, Cybersecurity, Information Systems Security, Cyber Security Strategy, Security Strategy, Security Management, Artificial Intelligence, Cyber Attacks, Cloud Security, Security Awareness, Enterprise Security, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response
Beginner · Course · 1 - 4 Weeks

University of Copenhagen
Skills you'll gain: Sustainable Development, Sustainability Standards, Water Resource Management, Water Sustainability, Environment and Resource Management, Environmental Issue, Sustainable Business, Environmental Policy, Natural Resource Management, Waste Minimization, Public Health, Hospitality, Case Studies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, Security Testing, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 4 Weeks

École Polytechnique
Skills you'll gain: Peer Review, Journals, Scientific Methods, Research, Research Design, Proofreading, Research Methodologies, Editing, Ethical Standards And Conduct, Data Management
Mixed · Course · 1 - 4 Weeks
Michigan State University
Skills you'll gain: Infographics, Adobe Illustrator, Graphic and Visual Design, Data Mapping, Graphic Design, Typography, Design Elements And Principles, Graphical Tools, Storytelling, Color Theory
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Vulnerability Assessments, Blockchain, Application Security, Cryptographic Protocols, Computer Security, Security Testing, Security Engineering, Network Security, Data Security, Infrastructure Security, Cryptography, Malware Protection, Scripting, Transaction Processing, Secure Coding, Network Protocols, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Active Listening, Empathy, Compassion, Diversity and Inclusion, Team Building, Emotional Intelligence, Leadership and Management, Leadership, Self-Awareness, Collaboration, Employee Engagement, Adaptability, Workforce Management
Mixed · Course · 3 - 6 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Web Scraping, Web Applications
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Intermediate · Course · 1 - 3 Months