
Northeastern University
Skills you'll gain: Responsible AI, Data Ethics, Data Governance, Artificial Intelligence, Dependency Analysis, Information Privacy, Law, Regulation, and Compliance, Personally Identifiable Information, Ethical Standards And Conduct, General Data Protection Regulation (GDPR), Artificial Intelligence and Machine Learning (AI/ML), Data-Driven Decision-Making, Risk Management Framework, Diversity Awareness, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Agentic systems, Data Ethics, Discussion Facilitation, Business Ethics, Ethical Standards And Conduct, Healthcare Ethics, Regulation and Legal Compliance, Artificial Intelligence, Compliance Management, Case Studies, Governance, Accountability, Human Centered Design, Predictive Modeling
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, Security Testing, General Data Protection Regulation (GDPR)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Data Ethics, Healthcare Ethics, Responsible AI, Ethical Standards And Conduct, Computer Security Awareness Training, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Information Technology, Medical Privacy, Information Privacy, Machine Learning, Media and Communications, Automation, Cultural Diversity, Personally Identifiable Information, Workplace inclusivity, Law, Regulation, and Compliance, Emerging Technologies
Build toward a degree
Beginner · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Mobile Security, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Cybersecurity, Application Security, Cloud Computing, Cryptography, Vulnerability Scanning, Virtualization, Network Security, Encryption, SQL
Intermediate · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Security Testing, Threat Detection, Exploit development, Git (Version Control System), GitLab, GitHub, Problem Solving
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)
Intermediate · Course · 1 - 3 Months