
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Enterprise Risk Management (ERM), Business Risk Management, Security Controls, System Implementation, Security Awareness, Information Privacy, Security Management, Security Strategy
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Network Analysis, Operating Systems
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Test Script Development, Brute-force attacks, Cloud Security, Network Analysis, API Testing, General Data Protection Regulation (GDPR), Wireless Networks, Security Controls
Intermediate · Specialization · 1 - 3 Months

University of Michigan
Skills you'll gain: Nutrition and Diet, Sustainable Development, Environment, Sustainability Standards, Product Lifecycle Management, Environmental Science, Public Health and Disease Prevention, Health Disparities, Process Analysis, Climate Change Mitigation, Data Collection
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Risk Mitigation, Business Process Modeling, Stakeholder Analysis, Risk Analysis, Project Scoping, Stakeholder Management, Process Flow Diagrams, Risk Management, Work Breakdown Structure, Stakeholder Engagement, Scope Management, Business Requirements, Presentations, Requirements Elicitation, Business Analysis, Looker (Software), Requirements Analysis, Project Management, Process Optimization, Data Analysis Software
Advanced · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Program Evaluation, Health Assessment, Health Policy, Health Care Procedure and Regulation, Health Systems, Data Collection, Surveys, Community Health, Maternal Health, Research Design, Child Health
Mixed · Course · 1 - 3 Months

Skills you'll gain: Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Digital Forensics, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Continuous Monitoring, Risk Management Framework, Security Controls, Security Management, Information Systems Security, Cyber Risk, Security Requirements Analysis, Cyber Security Assessment, Authorization (Computing), Cyber Security Policies, Information Privacy, Information Systems
Mixed · Course · 1 - 3 Months

Coursera
Skills you'll gain: Account Strategy, Account Management, Customer Success Management, Customer Engagement, Customer Relationship Building, Customer Relationship Management, Milestones (Project Management), Growth Strategies, Expectation Management, Relationship Management, Data-Driven Decision-Making, Drive Engagement, Goal Setting, Needs Assessment
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Risk Management, Cryptography, Cybersecurity, Cloud Computing Architecture, Network Security, Incident Response, Threat Management, Cloud Security, Threat Modeling, Risk Analysis, Business Risk Management, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Cyber Threat Intelligence
Intermediate · Specialization · 3 - 6 Months