
Skills you'll gain: Responsible AI, AI Personalization, Data Ethics, Information Privacy, Persona (User Experience), User Research, Multimodal Prompts, Diversity Awareness, Persona Development, User Experience Design, Usability, Artificial Intelligence, Accountability, Human Centered Design, Ethical Standards And Conduct, User Centered Design
Intermediate · Course · 1 - 4 Weeks

Fractal Analytics
Skills you'll gain: Responsible AI, Data Ethics, Artificial Intelligence, Ethical Standards And Conduct, Information Privacy, Personally Identifiable Information, Data Governance, Data Security, Governance, Accountability, Complex Problem Solving, Mitigation, Critical Thinking
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Legal Risk, Responsible AI, Data Ethics, Generative AI, Personally Identifiable Information, Law, Regulation, and Compliance, Engineering Software, Information Privacy, Regulation and Legal Compliance, Artificial Intelligence, Data Security, Case Studies, Diversity Awareness, Ethical Standards And Conduct, Governance, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Data Ethics, Marketing Management, AI Personalization, Marketing Strategies, Business Ethics, Ethical Standards And Conduct, Marketing Analytics, Case Studies, Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Security Assessment, Network Security, Cyber Threat Intelligence, Threat Detection, Exploitation techniques, Vulnerability Assessments, Application Security, Intrusion Detection and Prevention, Security Awareness, Web Servers
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months
Duke University
Skills you'll gain: Responsible AI, Large Language Modeling, Data Ethics, Decision Tree Learning, Regression Analysis, Generative AI, Artificial Intelligence, Predictive Modeling, Statistical Modeling, Python Programming, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Applied Machine Learning, Image Analysis, Machine Learning Methods, Deep Learning, Visualization (Computer Graphics), Plot (Graphics), Artificial Neural Networks, Algorithms
Intermediate · Specialization · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Security Awareness
Intermediate · Specialization · 3 - 6 Months