
Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Incident Response, Information Systems Security, Risk Management Framework, Network Security, Security Information and Event Management (SIEM), Event Monitoring, Network Analysis, Firewall, Vulnerability Management, Data Integrity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Game Design, Object Oriented Programming (OOP), Video Game Development, C# (Programming Language), Computer Graphics, User Interface (UI), Debugging
Mixed · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Data Integrity, Cybersecurity, Computer Security, Authentications, Data Security, Theoretical Computer Science, Algorithms, Digital Communications, Information Architecture
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Social Network Analysis, Network Analysis, Computational Thinking, Analysis, Probability & Statistics, Network Routing, Probability, Pseudocode, Computational Logic, Operations Research
Intermediate · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Microsoft Office, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Generative AI, Operating Systems, Collaborative Software, System Support, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Cloud Computing
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Responsible AI, Cloud Development, Image Analysis, Anomaly Detection, Prompt Engineering, Microsoft Copilot, Microsoft Azure, Cloud Storage, Data Storage, Cloud Applications, Text Mining, Microsoft Development Tools, Unsupervised Learning, Data Storage Technologies, Natural Language Processing, Cloud Hosting, Continuous Deployment, Computer Vision, Cloud Computing, Machine Learning
Intermediate · Specialization · 3 - 6 Months
University of Illinois Urbana-Champaign
Skills you'll gain: Data Storytelling, Marketing Analytics, Case Studies, Web Analytics, Analytics, Business Analytics, Trend Analysis, Digital Marketing, Data Analysis, Marketing, Data Collection, Fraud detection, Information Privacy
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Mapping, File Transfer Protocol (FTP), Middleware, Transaction Processing, Verification And Validation, Data Integration, Fraud detection, Web Services, Integration Testing, System Testing, Data Validation, Simple Object Access Protocol (SOAP), Development Testing, Enterprise Architecture, Business Process Automation, Process Driven Development, Oracle Databases, Service Oriented Architecture, Enterprise Application Management, Business
Beginner · Specialization · 1 - 3 Months

ISC2
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
Beginner · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months