
Microsoft
Skills you'll gain: Extract, Transform, Load, Data Cleansing, Power BI, Data Transformation, Data Manipulation, Data Management, Data Quality, Data Preprocessing, Data Validation, Data Integration, Data Modeling, Data Import/Export, Data Storage
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy
Intermediate · Course · 1 - 3 Months

The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, Data Storage, File Management, Data Security, Information Management, Data Strategy, Metadata Management, Records Management, Data Governance, Data Integrity, Data Literacy, Information Privacy, Version Control
Mixed · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Cloud Computing Architecture, Identity and Access Management, Cloud Infrastructure, AWS Identity and Access Management (IAM), Virtual Machines, Cloud Security, Virtualization, Cloud Computing, Cloud Deployment, Cloud Platforms, Authorization (Computing), Role-Based Access Control (RBAC), User Provisioning, Threat Management, Authentications, Zero Trust Network Access, Multi-Factor Authentication, Threat Detection, Scalability
Beginner · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Talent Management, Goal Setting, Team Building, Teamwork, Team Management, Talent Pipelining, Influencing, Visionary, Team Leadership, People Development, Motivational Skills, Smart Goals, Employee Onboarding, Employee Coaching, Conflict Management, Talent Recruitment, Interviewing Skills, Persuasive Communication, Leadership, Business Leadership
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Information Systems Security, Risk Management, Continuous Monitoring, Information Assurance, Cyber Governance, Governance, Cybersecurity, Security Controls, Business Risk Management, ISO/IEC 27001, Threat Modeling, Risk Analysis, Threat Management, Vulnerability Assessments, Regulatory Compliance, System Monitoring, Information Systems, Asset Management, Intellectual Property
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Containerization, Microservices, Authentications, OAuth, Application Deployment, Integration Testing, Event-Driven Programming, Data Migration, Application Programming Interface (API), Software Architecture, Software Design Patterns, Scalability, Systems Integration
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Power BI, Data Analysis Expressions (DAX), Data Modeling, Star Schema, Data Warehousing, Data Security, Data Visualization Software, Pivot Tables And Charts, Performance Tuning, Business Intelligence, Excel Formulas, Role-Based Access Control (RBAC)
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter
Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Work Breakdown Structure, Project Planning, Project Management, Planning, Leadership
Mixed · Course · 1 - 3 Months

Skills you'll gain: Data Transformation, Power BI, Data-Driven Decision-Making, Data Integration, Data Cleansing, Data Wrangling, Extract, Transform, Load, Data Preprocessing, Data Modeling, Business Intelligence, Data Visualization Software, Data Quality, Data Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Modeling, Data Loss Prevention, Mobile Security, DevSecOps, MLOps (Machine Learning Operations), Vulnerability Scanning, Incident Response, LLM Application, Security Engineering, Anomaly Detection, Application Security, Responsible AI, Security Controls, Data Security, CI/CD, Infrastructure Security, Continuous Monitoring, Penetration Testing, Process Optimization, Vulnerability Assessments
Intermediate · Specialization · 3 - 6 Months