
Skills you'll gain: Large Language Modeling, Generative AI, Model Deployment, Natural Language Processing, Prompt Engineering, Deep Learning, MLOps (Machine Learning Operations), Cloud Deployment, Model Evaluation, Continuous Monitoring, Data Cleansing, Machine Learning
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Exploitation techniques, Threat Detection
Beginner · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Identity and Access Management, IT Security Architecture, Incident Response, Security Controls, Endpoint Security, Event Monitoring, Cybersecurity, Data Security, Infrastructure Security, Mobile Security, Threat Detection, Firewall, Encryption, Virtual Private Networks (VPN), Digital Forensics, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Data Loss Prevention, Cloud Security, Network Security, Data Security, Firewall, Identity and Access Management, Security Controls, Virtual Private Networks (VPN), Key Management, Security Management, Google Cloud Platform, Continuous Monitoring, Encryption, Security Engineering, Payment Card Industry (PCI) Data Security Standards, CI/CD
Beginner · Course · 1 - 3 Months
Skills you'll gain: Endpoint Security, Infrastructure Security, Security Management, Network Security, Cyber Security Policies, Security Controls, Data Security, Security Strategy, Application Security, IT Infrastructure, Information Management, Enterprise Security, Data Integrity
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Google Cloud Platform, Firewall, Data Maintenance, Cloud Infrastructure, Virtual Machines, Network Monitoring, System Configuration, Data Storage Technologies, Blockchain, System Monitoring, Event Monitoring, Cloud Deployment, Application Deployment
Intermediate · Project · Less Than 2 Hours

LearnKartS
Skills you'll gain: Threat Modeling, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cyber Governance, Security Awareness, Law, Regulation, and Compliance, Security Strategy, Human Factors (Security), Culture Transformation, Cyber Attacks, Mobile Security, Cyber Risk, Enterprise Security, Data Ethics, Cyber Security Strategy, Cybersecurity, Strategic Leadership, Cyber Operations, Leadership and Management, Leadership, Organizational Leadership, Leadership Development, Team Leadership
Beginner · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Site Reliability Engineering, Incident Management, System Monitoring, Network Monitoring, Prometheus (Software), Google Cloud Platform, Application Performance Management, Continuous Monitoring, Kubernetes, Cloud Applications, Security Information and Event Management (SIEM), Service Level, Firewall, Cloud Computing, Debugging
Beginner · Course · 1 - 3 Months
Skills you'll gain: Supply Chain Management, Supply Chain Planning, Inventory Management System, Supply Chain Systems, Forecasting, Customer Demand Planning, AI Enablement, Supplier Management, Risk Mitigation, Transportation, Supply Chain, and Logistics, Automation, Risk Management, Operational Efficiency
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Email Security, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity
Beginner · Course · 1 - 4 Weeks