
University of California San Diego
Skills you'll gain: Session Initiation Protocols, Android Studio, Android Development, Internet Of Things, Communication Systems, Network Protocols, Telecommunications, Wireless Networks, Mobile Development, Application Development, Embedded Systems, Open Source Technology
Mixed · Course · 1 - 3 Months

Skills you'll gain: Unix Shell, Unix Commands, Unix, Shell Script, Bash (Scripting Language), Command-Line Interface, Remote Access Systems, Scripting, Systems Administration, Operating System Administration, Linux Commands, IT Automation, Linux, User Accounts, File Systems, System Monitoring, Operating Systems, File Management, Performance Tuning, System Programming
Beginner · Specialization · 1 - 3 Months

Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
Build toward a degree
Intermediate · Course · 1 - 3 Months

Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Non-Verbal Communication, Personal Development, Conflict Management, Self-Awareness, Stress Management, Health Technology
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: File Systems, Linux, Linux Commands, File Management, Linux Administration, Operating Systems, Unix, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Routing Protocols, Virtual Private Networks (VPN), Network Troubleshooting, Open Shortest Path First (OSPF), Network Routing, Network Engineering, Border Gateway Protocol, TCP/IP, Network Infrastructure, Multiprotocol Label Switching, Network Administration, Wide Area Networks, Network Security, Network Monitoring, Firewall, Network Performance Management, Dynamic Host Configuration Protocol (DHCP), Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

EDUCBA
Skills you'll gain: Enterprise Architecture, Stakeholder Management, Business Architecture, Stakeholder Engagement, Risk Management, Information Technology Architecture, Stakeholder Analysis, Solution Architecture, Stakeholder Communications, Data Architecture, Governance, Infrastructure Architecture, Gap Analysis, Business Transformation, Change Management, Application Design
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Verification And Validation, Pharmacology, Environmental Science, Research, Safety Assurance, Scientific Methods, Biostatistics, Bioinformatics, Research Methodologies, Environmental Regulations, Research Design, Risk Analysis, Data Synthesis
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Test Tools, Security Information and Event Management (SIEM), Event Monitoring, Malware Protection, Network Security
Beginner · Project · Less Than 2 Hours
Google Cloud
Skills you'll gain: Istio, Kubernetes, CI/CD, Serverless Computing, Multi-Cloud, Hybrid Cloud Computing, Application Deployment, Google Cloud Platform, Cloud-Native Computing, Cloud Infrastructure, Containerization, Network Security, Continuous Deployment, Cloud Management, Cloud Applications, Microservices, Continuous Integration, Cloud Computing Architecture, Identity and Access Management, Microsoft Azure
Intermediate · Specialization · 3 - 6 Months

Scrimba
Skills you'll gain: Cloud Applications, Cloud API, Application Deployment, API Gateway, Application Programming Interface (API), Cloud Computing, Serverless Computing, Application Security, LLM Application, Web Servers, OpenAI, Distributed Computing
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months