
Skills you'll gain: Reinforcement Learning, Regulatory Compliance, Due Diligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Analysis, Policy Analysis, Policy Development, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Cryptography, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, MySQL, Vulnerability Scanning, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Brute-force attacks, Information Systems Security, Cybersecurity, Virtual Machines, Virtual Environment, Network Analysis
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Data Ethics, Responsible AI, Compliance Auditing, Ethical Standards And Conduct, Compliance Management, Auditing, Technical Documentation, Case Studies, Project Documentation, Model Deployment, Model Evaluation, Business Ethics, MLOps (Machine Learning Operations), Accountability, Mitigation, Data Quality
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Data Ethics, Responsible AI, Emerging Technologies, Business Ethics, Ethical Standards And Conduct, Big Data, Information Privacy, Personally Identifiable Information, Artificial Intelligence, Diversity and Inclusion, Decision Making, Data Science
Beginner · Course · 1 - 3 Months

Skills you'll gain: Business Ethics, Responsible AI, AI Security, Data Ethics, Ethical Standards And Conduct, Intellectual Property, Stakeholder Engagement, Diversity Equity and Inclusion Initiatives, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Brute-force attacks, Cybersecurity, Vulnerability Assessments, Linux, Command-Line Interface, Cryptography, File Management, Microsoft Windows, Scripting, Virtual Machines
Intermediate · Course · 1 - 3 Months