
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Data Security, Journalism, Emerging Technologies, Media and Communications, Internet Of Things, Algorithms, Artificial Intelligence
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Data Storage Technologies, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Encryption, Key Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Time Series Analysis and Forecasting, Statistical Analysis, Data Analysis, Machine Learning Algorithms, Data Visualization, Exploratory Data Analysis, Statistical Programming, Statistical Methods, Statistical Machine Learning, Statistical Reporting, Data Cleansing, Forecasting, Analytics, Regression Analysis, R Programming, Statistical Modeling, Statistical Software, Data Science, Supervised Learning, Machine Learning
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Bayesian Statistics, Machine Learning Algorithms, Statistical Analysis, Statistical Inference, Data Visualization, Data Analysis, Regression Analysis, Data Cleansing, Analytics, Statistical Modeling, Machine Learning, Statistical Software, R Programming, Data Science, Statistical Programming, Statistical Methods, R (Software), Data Validation, Data Manipulation, Exploratory Data Analysis
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Public Key Cryptography Standards (PKCS), Cryptography, Data Structures, Algorithms, Encryption, Theoretical Computer Science, Computer Science, Computational Thinking, Data Storage Technologies, Linear Algebra, Python Programming, Arithmetic
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Mining, Unsupervised Learning, Big Data, Supervised Learning, Machine Learning Methods, Classification And Regression Tree (CART), Data Analysis, Anomaly Detection, Machine Learning Algorithms, Advanced Analytics, Statistical Analysis, Predictive Modeling, Network Analysis, Exploratory Data Analysis, Bayesian Statistics, Algorithms, Artificial Neural Networks, Scalability
Build toward a degree
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Generative AI, Security Awareness
Beginner · Course · 1 - 4 Weeks

ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
Beginner · Course · 1 - 4 Weeks

EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Security Requirements Analysis, Data Access, Vulnerability Assessments, Data Management, Information Management, Big Data
Beginner · Course · 1 - 4 Weeks