
Skills you'll gain: Multi-Cloud, Enterprise Architecture, Cloud Computing Architecture, Cloud Platforms, Data-Driven Decision-Making, Solution Architecture, Systems Architecture, Cloud Infrastructure, Cloud Services, Artificial Intelligence and Machine Learning (AI/ML), Scalability, CI/CD, IT Security Architecture, Infrastructure As A Service (IaaS), Capacity Planning, Systems Analysis, Security Controls, Cost Containment, Blueprinting, Continuous Monitoring
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: AI Security, Mobile Security, Model Deployment, Mobile Development, Continuous Monitoring, Application Security, Threat Modeling, Apple iOS, Security Requirements Analysis, System Monitoring, Encryption, Threat Management, Security Management, Information Privacy, Program Implementation
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Semiconductors, Manufacturing Standards, Production Process, Manufacturing Operations, Electronics Engineering, Manufacturing Processes, Electronics, Process Control, Process Engineering, Chemical Engineering, Materials science, Infrastructure Security, Security Controls, Network Infrastructure, Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Threat Management, Cyber Security Strategy, Security Controls, Cybersecurity, IT Security Architecture, Hardening
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Malware Protection, Authentications, Identity and Access Management, Cyber Attacks, Threat Detection, Data Integrity
Beginner · Specialization · 3 - 6 Months
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Open Web Application Security Project (OWASP), Responsible AI, Threat Modeling, Vulnerability Scanning, AI Personalization, Continuous Integration, Code Review, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Digital Forensics, Investigation, Cybersecurity, Data Integrity, Criminal Investigation and Forensics, Data Ethics, Computer Security, Scenario Testing, Technical Communication, Incident Response, Writing, Technical Documentation, Data Analysis Software, File Systems, Artifactory, Microsoft Windows
Beginner · Course · 1 - 3 Months

Skills you'll gain: Risk Management, Governance, ISO/IEC 27001, Enterprise Risk Management (ERM), Cyber Governance, NIST 800-53, Cyber Risk, Compliance Management, Security Controls, Program Implementation, Regulatory Compliance, Cybersecurity, Cyber Security Strategy, Business Continuity, Asset Management
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Cyber Security Strategy, Cyber Threat Intelligence, Risk Management Framework, IT Service Management, Problem Management, IT Management, Business Risk Management, NIST 800-53, Test Planning, Employee Training, Continuous Improvement Process, Stakeholder Communications, Simulations, Root Cause Analysis
Intermediate · Course · 1 - 3 Months

The Hong Kong University of Science and Technology
Skills you'll gain: Continuous Monitoring, Risk Management, FinTech, Change Management, Emerging Technologies
Beginner · Course · 1 - 4 Weeks
Coursera
Skills you'll gain: AI Security, USB, Threat Modeling, Model Deployment, Electronic Hardware, CI/CD, Security Engineering, Routing Protocols, Electronics Engineering, Schematic Diagrams, Verification And Validation, Design Software, Technical Design, Differential Equations, Business Strategies
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Vulnerability Assessments, Vulnerability Management, Application Security, Security Controls, Security Testing, Authentications, Threat Management, Dependency Analysis, Application Programming Interface (API), API Design, Risk Analysis, Data Validation, Supply Chain
Intermediate · Course · 1 - 4 Weeks