
Fractal Analytics
Skills you'll gain: Threat Modeling, LLM Application, Generative AI Agents, Application Security, Software Architecture, Systems Architecture, Security Controls, Security Engineering, Interoperability, Agentic systems, Real Time Data, Artificial Intelligence, Network Protocols, Generative AI
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Security, Network Administration, Infrastructure Security, Ansible, Information Systems Security, Firewall, Security Controls, Wireless Networks, Network Monitoring, Computer Networking, Software-Defined Networking, Identity and Access Management, Authorization (Computing), Scripting, Authentications, Automation, Encryption
Intermediate · Course · 3 - 6 Months

Duke University
Skills you'll gain: Blockchain, Cyber Risk, FinTech, Operational Risk, Scalability, Regulatory Compliance, Legal Risk, Exploit development, Financial Regulations, Risk Analysis, Vulnerability Assessments, Secure Coding, Governance, Environmental Social And Corporate Governance (ESG)
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Dataflow, Google Cloud Platform, Data Pipelines, Serverless Computing, Real Time Data, Cloud Infrastructure, Identity and Access Management, MLOps (Machine Learning Operations), Big Data, AI Personalization, Data Visualization Software, Data Integration, Cloud Security, Data Integrity, Performance Tuning, Looker (Software), Data Security, Cloud Computing, Tensorflow, Data Processing
Beginner · Specialization · 3 - 6 Months

DeepLearning.AI
Skills you'll gain: Tensorflow, Application Deployment, MLOps (Machine Learning Operations), Deep Learning, Applied Machine Learning, Machine Learning, Distributed Computing, Information Privacy, Web Servers, Application Programming Interface (API), Data Processing, Data Security, Data Visualization
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Intermediate · Specialization · 3 - 6 Months

Board Infinity
Skills you'll gain: Data Structures, Spring Boot, Restful API, Model View Controller, Spring Framework, Web Services, Java Programming, Java, Back-End Web Development, Authentications, Programming Principles, Authorization (Computing), Software Architecture, Algorithms, Object Oriented Programming (OOP)
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Data Security, Development Testing, Authorization (Computing), Data Validation
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Microsoft Windows, Data Analysis Software, User Accounts, USB, File Systems, System Configuration, Software Installation, Computer Security Incident Management, File Management, Data Access, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Network Security, OSI Models, Public Key Infrastructure, Network Protocols, Encryption, Remote Access Systems, Firewall, Emerging Technologies, TCP/IP, Wireless Networks, Authentications
Advanced · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Application Security, Cloud Infrastructure, Network Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks