
Johns Hopkins University
Skills you'll gain: Social Network Analysis, Network Analysis, Graph Theory, Social Sciences, Statistical Analysis, R Programming, Sociology, Statistical Modeling, Statistical Hypothesis Testing
Intermediate · Course · 1 - 4 Weeks

Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Security Controls, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Identity and Access Management, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Application Security, Serverless Computing, Secure Coding, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Cloud Services, Web Applications, Cloud Platforms, Javascript, Node.JS, Amazon Web Services
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Compliance Management, Microsoft 365, Microsoft Azure, Governance Risk Management and Compliance, DevSecOps, Endpoint Detection and Response, Cloud Security, Role-Based Access Control (RBAC), Identity and Access Management, Threat Detection, Zero Trust Network Access, Data Governance, Active Directory, Endpoint Security, Authorization (Computing), Data Security, Vulnerability Management, Multi-Factor Authentication, Enterprise Security, Operations
Beginner · Specialization · 1 - 3 Months

Radio y Televisión Española
Skills you'll gain: Social Media Content, Social Media Strategy, Social Media Management, Content Strategy, Web Content, Media and Communications, Content Creation, Social Network Analysis, Digital Communications, Research
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Digital Forensics, Disaster Recovery, Risk Management Framework, Cybersecurity, NIST 800-53, Threat Management, Risk Management, Security Strategy, Network Security, Security Controls, Vulnerability Assessments, Virtualization and Virtual Machines, Cloud Computing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL
Beginner · Specialization · 1 - 3 Months

Council on Foreign Relations
Skills you'll gain: Climate Change Adaptation, Climate Change Mitigation, Energy and Utilities, Social Justice, Environmental Issue, Sustainable Development, Environmental Policy, Emerging Technologies, Sustainable Technologies, Artificial Intelligence
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Pivot Tables And Charts, Data Manipulation, Data Transformation, Data Preprocessing, Data Warehousing, Data Cleansing, Dimensionality Reduction, Data Quality, Anomaly Detection, Feature Engineering, Sampling (Statistics), Exploratory Data Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Real Time Data, Model Deployment, Anomaly Detection, Artificial Intelligence and Machine Learning (AI/ML), AI Security, Telecommunications, Tensorflow, Artificial Intelligence, Emerging Technologies, Network Performance Management, Generative AI, Generative AI Agents, Wireless Networks, Computer Networking, Network Architecture, Responsible AI, Digital Communications, Network Protocols, System Design and Implementation, Communication
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks