
Skills you'll gain: Crisis Management, Data Ethics, Governance, Business Ethics, Strategic Leadership, Responsible AI, Law, Regulation, and Compliance, Media Relations, Strategic Thinking, Communication Strategies, Business Leadership, Accountability, Ethical Standards And Conduct, Emerging Technologies, Organizational Leadership, Risk Management, Communication, Leadership, Test Planning, Learning Strategies
Beginner · Professional Certificate · 3 - 6 Months

Starweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Healthcare Ethics, Ethical Standards And Conduct, Responsible AI, Data Security, Data Science, Medical Privacy, Machine Learning Algorithms, Algorithms, Information Privacy, Artificial Intelligence, Diversity Awareness, Case Studies
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Responsible AI, AI Personalization, Data Ethics, Information Privacy, Persona (User Experience), User Research, Multimodal Prompts, Diversity Awareness, Persona Development, User Experience Design, Usability, Artificial Intelligence, Accountability, Human Centered Design, Ethical Standards And Conduct, User Centered Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks