
The University of Notre Dame
Skills you'll gain: Data Ethics, Analytics, Responsible AI, Big Data, Data Analysis, Ethical Standards And Conduct, Machine Learning, Business Ethics, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Artificial Intelligence, Technology Strategies, Law, Regulation, and Compliance, Predictive Analytics, Social Justice, Case Studies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Legal Risk, Responsible AI, Data Ethics, Generative AI, Personally Identifiable Information, Law, Regulation, and Compliance, Engineering Software, Information Privacy, Regulation and Legal Compliance, Artificial Intelligence, Data Security, Case Studies, Diversity Awareness, Ethical Standards And Conduct, Governance, Mitigation
Beginner · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Professional Development, Business Ethics, Professionalism, Decision Making, Ethical Standards And Conduct, Personal Integrity, Trustworthiness, Communication Strategies, Communication, Problem Solving, Interpersonal Communications, Self-Awareness, Conflict Management
Beginner · Course · 1 - 3 Months
Duke University
Skills you'll gain: Data Ethics, Responsible AI, Data Visualization, Data Presentation, Data Storytelling, Ethical Standards And Conduct, Data Science, Data Collection, Data Visualization Software, Personally Identifiable Information, Information Privacy, Machine Learning, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

Skills you'll gain: UI/UX Research, Usability Testing, Presentations, User Experience Design, User Research, Data Ethics, User Centered Design, Research Design, Prototyping, Research Methodologies, Wireframing, Information Privacy
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Coursera
Skills you'll gain: Brainstorming, Root Cause Analysis, Collaborative Software, Business Analysis, Problem Management, Process Analysis, Design Thinking, Business Process Management
Beginner · Guided Project · Less Than 2 Hours

Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months