
Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Zero Trust Network Access, Cyber Attacks, Application Security, Cyber Risk, Computer Security, Information Systems Security, Data Security, Network Security, Encryption, Multi-Factor Authentication, Cryptography, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

Logical Operations
Skills you'll gain: Microsoft Access, Database Management, Excel Macros, Microsoft 365, Database Development, Database Administration, Database Architecture and Administration, Data Maintenance, Microsoft Windows, Database Software, Databases, Relational Databases, Query Languages, Database Design, Data Entry, Microsoft Office, Data Presentation, Productivity Software, Scripting, User Interface (UI)
Mixed · Course · 1 - 3 Months

ISC2
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
Beginner · Course · 1 - 3 Months

Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Real Time Data, Model Deployment, Anomaly Detection, Artificial Intelligence and Machine Learning (AI/ML), AI Security, Telecommunications, Tensorflow, Artificial Intelligence, Emerging Technologies, Network Performance Management, Generative AI, Generative AI Agents, Wireless Networks, Computer Networking, Network Architecture, Responsible AI, Digital Communications, Network Protocols, System Design and Implementation, Communication
Intermediate · Course · 1 - 4 Weeks

Lund University
Skills you'll gain: Legal Research, Law, Regulation, and Compliance, International Relations, European History, Regulatory Compliance, Business Economics, Compliance Management, Environmental Laws, E-Commerce, Public Policies, Case Law, Labor Law, Commercial Laws, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: OpenAI API, Generative Model Architectures, Hugging Face, Programming Principles, Computer Programming, Software Installation
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cybersecurity, Security Awareness, Security Controls, Multi-Factor Authentication, Authentications, Financial Market, Market Data, Financial Regulations, Regulatory Compliance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Responsible AI, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months

Skills you'll gain: ASP.NET, Web Applications, Microservices, Single Sign-On (SSO), Performance Tuning, Identity and Access Management, Full-Stack Web Development, C# (Programming Language), Application Development, Application Security, Cloud Development, Multi-Factor Authentication, Authentications, Role-Based Access Control (RBAC), Scalability, Real Time Data
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Application Security, Secure Coding, Open Web Application Security Project (OWASP), Security Engineering, Security Requirements Analysis, Security Controls, Data Security, Vulnerability Management, Computer Security, Vulnerability, Vulnerability Assessments, Databases, Information Privacy, Role-Based Access Control (RBAC), Computer Programming, Python Programming, Node.JS, JavaScript Frameworks, Javascript
Mixed · Course · 1 - 4 Weeks