
Skills you'll gain: Incident Response, Vulnerability Management, Continuous Monitoring, Digital Forensics, Public Key Infrastructure, Security Management, Business Continuity Planning, Cryptography, Endpoint Security, Disaster Recovery, Computer Security Incident Management, Encryption, Network Security, Authentications, Mobile Security, OSI Models, System Monitoring, Security Controls, Security Strategy, Risk Analysis
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Lean Manufacturing, Waste Minimization, Lean Methodologies, Supplier Management, Quality Control, Quality Management, Manufacturing Operations, Production Management, Production Process, Operational Efficiency, Supplier Relationship Management, Inventory Control, Process Improvement, Continuous Improvement Process, Facility Management, System Implementation, Team Building
Beginner · Course · 1 - 3 Months

Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Enterprise Security, Mobile Security, Operating System Administration, Security Management, Android (Operating System), Patch Management, Microsoft Azure, System Monitoring, Azure Active Directory, Vulnerability Management, Apple iOS, Remote Access Systems, Configuration Management, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Gmail, Authorization (Computing), Google Workspace, Email Security, Data Governance, Cloud Security, Identity and Access Management, Document Management, Data Management, File Management, Enterprise Application Management, User Provisioning, Data Security, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Email Marketing
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Contingency Planning, Business Continuity Planning, Computer Security Incident Management, Security Management, Incident Response, Disaster Recovery, Data Centers, Incident Management, Security Controls, Information Systems Security, Infrastructure Security, Configuration Management, Data Security, Change Control, Digital Forensics
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Security Awareness, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Medical Records, Information Privacy, Cloud Computing, Patient Safety
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Cyber Security Assessment, Regulatory Requirements
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Application Lifecycle Management, Power Apps Component Framework, Microsoft Power Platform, Integration Testing, Microsoft Power Automate/Flow, Azure DevOps, Power Platform CLI, Application Development, DevOps, Application Deployment, Database Design, Development Environment, Microsoft Azure, Usability Testing, Development Testing, User Interface and User Experience (UI/UX) Design, Postman API Platform, Data Modeling, Microsoft Copilot, Power BI
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Recurrent Neural Networks (RNNs), Time Series Analysis and Forecasting, Keras (Neural Network Library), PyTorch (Machine Learning Library), Natural Language Processing, Tensorflow, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Data Preprocessing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks