
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Generative AI, Supervised Learning, Large Language Modeling, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Python Programming, Data-Driven Decision-Making, Feature Engineering
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Authentications, Application Security, Open Web Application Security Project (OWASP), Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Vulnerability Assessments
Intermediate · Specialization · 1 - 3 Months

Red Hat
Skills you'll gain: Ansible, Linux Commands, Linux Administration, Linux, Infrastructure as Code (IaC), YAML, Automation, DevOps, Configuration Management, Software Architecture
Beginner · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Data Security, Human Factors (Security), Software As A Service
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling
Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: No-Code Development, Application Deployment, Application Development, Data Integration, Application Design, Cloud Applications, User Interface (UI), User Experience, Spreadsheet Software
Beginner · Course · 1 - 3 Months

Skills you'll gain: Snowflake Schema, Dashboard, Data Warehousing, Database Management, Data Storage, SQL, Business Intelligence, Data Management, Data Visualization Software, Data Analysis, Cloud Computing, Cloud Platforms, Benchmarking, Market Share
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Remote Access Systems, Application Programming Interface (API), Network Model, TCP/IP, Network Protocols, System Programming, Data Access, Performance Tuning, Data Sharing, Computer Hardware
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Cybersecurity, Data Loss Prevention, Identity and Access Management, Code Review, Software Installation, Middleware, Debugging, Computer Programming, Information Technology
Beginner · Course · 1 - 3 Months