
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Operating System Administration, Vulnerability Assessments, Encryption, Threat Detection, Cybersecurity
Beginner · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Large Language Modeling, MLOps (Machine Learning Operations), Extract, Transform, Load, Prompt Engineering, Data Processing, Data Pipelines, AWS SageMaker, Application Deployment, Natural Language Processing, CI/CD, Data Collection, Performance Tuning
Beginner · Course · 1 - 3 Months

New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Intermediate · Course · 1 - 4 Weeks

Duke University
Skills you'll gain: Blockchain, FinTech, Interoperability, Payment Systems, Financial Inclusion, Financial Systems, Cryptography, Digital Assets, Financial Regulation, Banking, Encryption, Computer Security, Governance
Beginner · Course · 1 - 4 Weeks

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Digital Communications, Authentications, Data Integrity, Algorithms, Computer Science
Mixed · Course · 1 - 3 Months

University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
Beginner · Course · 1 - 4 Weeks

Whizlabs
Skills you'll gain: Data Governance, Extract, Transform, Load, Metadata Management, Role-Based Access Control (RBAC), Data Cleansing, Databricks, Data Management, Data Pipelines, Data Lakes, Amazon Web Services, Amazon Redshift, Data Architecture, Data Security, Personally Identifiable Information, Data Warehousing, Data Quality, General Data Protection Regulation (GDPR), Fraud detection
Intermediate · Course · 1 - 4 Weeks

University of California San Diego
Skills you'll gain: Session Initiation Protocols, Cloud Development, Android Development, Integrated Development Environments, Cloud Computing Architecture, GitHub, Cloud Computing, Application Development, Android (Operating System), Amazon Web Services, Software Design Documents, System Design and Implementation, Internet Of Things, Unit Testing, Android Studio, Telecommunications, Embedded Software, Mobile Development, Digital Communications, Computer Vision
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cryptography, Encryption, Risk Management Framework, Multi-Factor Authentication, Information Systems Security, Cybersecurity, Identity and Access Management, Authentications, Personally Identifiable Information, Security Controls, Threat Management, Data Security, Information Privacy, Cyber Risk, Authorization (Computing)
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
Beginner · Specialization · 3 - 6 Months