
Skills you'll gain: CI/CD, Software Development Life Cycle, Open Web Application Security Project (OWASP), Continuous Integration, Istio, Linux Commands, Software Architecture, Agile Software Development, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Restful API, Git (Version Control System), DevOps, Grafana, Software Engineering, Data Import/Export, Application Development
Build toward a degree
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Technical Documentation, Information Systems Security, Cybersecurity, Virtual Machines, System Configuration, Virtual Environment, Linux, Network Analysis
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Endpoint Detection and Response, Cloud Infrastructure, Firewall, Network Infrastructure, Threat Detection, Docker (Software), Software As A Service, Virtual Private Networks (VPN), Threat Management, Hybrid Cloud Computing, Containerization, Data Centers, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Vulnerability Scanning, Incident Response
Beginner · Professional Certificate · 3 - 6 Months
Starweaver
Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cybersecurity, Malware Protection, Data Loss Prevention, Cyber Attacks, Data Security, Encryption, System Implementation, Open Source Technology
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Prompt Engineering, Prompt Patterns, ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, AI Product Strategy, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Deep Learning, Vulnerability Management, Artificial Intelligence, Machine Learning, Incident Management
Intermediate · Specialization · 1 - 3 Months

University of Pennsylvania
Skills you'll gain: Financial Statements, Operations Management, Operational Efficiency, Financial Statement Analysis, Return On Investment, Accrual Accounting, Human Capital, Process Analysis, Financial Accounting, Process Management, People Management, Go To Market Strategy, Branding, Capital Budgeting, Marketing, Financial Reporting, Finance, Peer Review, Project Design, Corporate Finance
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Data Security, Encryption, Payment Card Industry (PCI) Data Security Standards, Security Controls, Cloud Solutions, Security Requirements Analysis, Network Security, Cloud Computing Architecture, Google Cloud Platform, CI/CD, Key Management, Virtual Private Networks (VPN), Firewall, Continuous Monitoring
Beginner · Course · 1 - 3 Months

Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications
Beginner · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Exploitation techniques, Cyber Security Assessment, Vulnerability Assessments, Mobile Security, Open Web Application Security Project (OWASP), Cloud Security, Threat Modeling, MITRE ATT&CK Framework, Network Security, Business Logic, Scripting, Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Exploitation techniques, Security Testing, Vulnerability Scanning, Vulnerability Assessments, Application Security, Authentications, Wireless Networks, Network Security, Linux, Encryption
Mixed · Course · 1 - 4 Weeks