
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Hardware Troubleshooting, Data Storage, Database Software, Operating Systems, Computer Networking, IT Infrastructure, Virtual Private Networks (VPN), Project Management
Beginner · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Vulnerability Assessments, Application Specific Integrated Circuits, Exploit development, Cryptography, Systems Design, Encryption, Exploitation techniques, Technical Design, Emerging Technologies
Mixed · Course · 1 - 3 Months

Erasmus University Rotterdam
Skills you'll gain: Security Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Safety and Security, Risk Management, Cybersecurity, Governance, Cultural Diversity, Economics, Policy, and Social Studies
Beginner · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Security Controls, Infrastructure Security, Remote Access Systems, Public Key Infrastructure, Cryptography, Vulnerability Assessments, Virtualization, Virtual Machines, Encryption, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Electronic Medical Record, Clinical Informatics, Health Technology, Health Information Management, Clinical Documentation, Decision Support Systems, Practice Management Software, Technical Support, End User Training and Support, Patient Registration, Databases, Change Control, Interoperability, Authentications
Mixed · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Security Engineering, Infrastructure Security, Cybersecurity, Data Security, Cryptography, Cryptographic Protocols, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Storytelling, Dashboard, Data Presentation, Data Visualization, Database Design, MySQL, Presentations, Descriptive Statistics, Extract, Transform, Load, Business Intelligence, Data Visualization Software, IBM DB2, Tableau Software, Relational Databases, Star Schema, IBM Cognos Analytics, Interactive Data Visualization, Microsoft SQL Servers, Regression Analysis, Excel Formulas
Beginner · Professional Certificate · 3 - 6 Months

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
Beginner · Specialization · 3 - 6 Months

Edureka
Beginner · Course · 1 - 4 Weeks

Amazon Web Services
Skills you'll gain: Amazon Web Services, Web Applications, Cloud Services, Amazon Elastic Compute Cloud, Information Technology, Cloud Computing, Public Cloud, IT Infrastructure, Computer Systems, Amazon S3, Web Development, General Networking, Web Servers, Operating Systems, Servers, Virtualization, Data Centers, Hypertext Markup Language (HTML), Data Analysis, Project Management
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making
Intermediate · Course · 1 - 3 Months