
University of Michigan
Skills you'll gain: Data Ethics, Policy Analysis, Case Studies, Political Sciences, Data Analysis, Responsible AI, Public Policies, Analytics, Model Evaluation, Data Presentation, Data-Driven Decision-Making, Ethical Standards And Conduct, R Programming, Machine Learning
Intermediate · Course · 1 - 4 Weeks

Birla Institute of Technology & Science, Pilani
Skills you'll gain: Operating Systems, OS Process Management, System Programming, File Systems, Unix Commands, Command-Line Interface, System Monitoring, System Design and Implementation, Performance Tuning, Package and Software Management, File Management, Algorithms, Cloud Platforms, Security Controls, User Accounts, Debugging
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Statistical Modeling, R Programming, Data Analysis, Data Ethics, Statistical Methods, Regression Analysis, Predictive Modeling, Mathematical Modeling, Machine Learning, Logistic Regression, Statistical Inference, Model Evaluation, Probability Distribution, Linear Algebra, Calculus
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Software Installation, Data Validation, Python Programming, Program Development, Computational Thinking, Development Environment, Data Processing, Computer Programming, System Configuration, Algorithms, Debugging
Mixed · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Application Security, Authentications, Brute-force attacks, Data Integrity, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Import/Export, Model Evaluation, No-Code Development, Exploratory Data Analysis, Predictive Modeling, Applied Machine Learning, Data Pipelines, Data Manipulation, Data Preprocessing, Machine Learning, Time Series Analysis and Forecasting
Beginner · Guided Project · Less Than 2 Hours

Scrimba
Skills you'll gain: Software Design Patterns, Computational Thinking, Software Design, Algorithms, Program Development, Software Development, Software Engineering, Programming Principles, Computer Programming, Problem Solving, Data Structures, Computer Science, Javascript, Web Development, Machine Learning Methods, Data Science
Intermediate · Specialization · 1 - 4 Weeks

Fundação Lemann
Skills you'll gain: Digital pedagogy, Education Software and Technology, Computer Programming, Learning Management Systems, Computational Thinking, Algorithms
Mixed · Course · 1 - 4 Weeks

LearnQuest
Skills you'll gain: Predictive Modeling, Predictive Analytics, Machine Learning Algorithms, Machine Learning, Algorithms, Responsible AI, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Model Evaluation, Business Ethics, Ethical Standards And Conduct
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Feature Engineering, Tensorflow, Google Cloud Platform, Model Deployment, Data Quality, Data Preprocessing, Model Evaluation, Scikit Learn (Machine Learning Library), Keras (Neural Network Library), Embeddings, Exploratory Data Analysis, Supervised Learning, Logistic Regression, MLOps (Machine Learning Operations), Machine Learning, AI Enablement, Data Pipelines, Jupyter, Dataflow, Artificial Neural Networks
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months