Skills you'll gain: Governance, Data Ethics, Business Ethics, Strategic Leadership, Business Leadership, Organizational Leadership, Governance Risk Management and Compliance, Ethical Standards And Conduct, Policy Development, Culture Transformation, Business Transformation, Stakeholder Engagement, Data Governance, Change Management, Employee Engagement
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Responsible AI, Diversity Awareness, Generative AI, Ethical Standards And Conduct, Cultural Diversity, Workplace inclusivity, Artificial Intelligence, Machine Learning, Law, Regulation, and Compliance, Algorithms, Information Privacy
Build toward a degree
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Responsible AI, Data Ethics, Artificial Intelligence, Compliance Management, Risk Mitigation, OpenAI, Mitigation, Ethical Standards And Conduct, Project Management Institute (PMI) Methodology, Prompt Engineering, Auditing, Risk Management Framework, Performance Metric
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Ubuntu, Cybersecurity, Cyber Attacks, Microsoft Windows, Computer Security, Computer Security Awareness Training, Information Systems Security, Linux, Cyber Security Policies, Network Security, Virtualization, Linux Commands, Linux Administration, Data Ethics, Data Security, Virtualization and Virtual Machines, Hardening, Command-Line Interface, Operating System Administration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Responsible AI, Data Ethics, Risking, Artificial Intelligence, Machine Learning, AI Product Strategy, Ethical Standards And Conduct, Case Studies, Legal Risk, Law, Regulation, and Compliance, Data-Driven Decision-Making, Analysis
Intermediate · Course · 1 - 4 Weeks

Simplilearn
Skills you'll gain: Responsible AI, Data Ethics, General Data Protection Regulation (GDPR), Ethical Standards And Conduct, Business Ethics, Information Privacy, Case Studies, Regulatory Compliance, Artificial Intelligence, Regulatory Affairs, Social Studies
Beginner · Course · 1 - 4 Weeks

Northeastern University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Data Governance, Governance, Artificial Intelligence, Machine Learning, Ethical Standards And Conduct, Organizational Strategy, Benchmarking, Emerging Technologies
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
Intermediate · Course · 1 - 3 Months