
Skills you'll gain: Full-Stack Web Development, UI Components, User Interface (UI), MySQL, User Interface (UI) Design, Object Oriented Programming (OOP), Event-Driven Programming, Database Design, Application Deployment, Application Design, Python Programming, Application Development, Database Management, Graphical Tools, Database Application, Databases, Software Design, Computer Graphics, Development Environment, SQL
Intermediate · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Network Routing, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Beginner · Course · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, International Relations, Policy Analysis, Environmental Issue, Systems Thinking, Governance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Jest (JavaScript Testing Framework), Unit Testing, TypeScript, Angular, Software Testing, JavaScript Frameworks, Web Development Tools, Development Testing, Test Case, Code Coverage, Test Automation, Testability, Integration Testing, Javascript, Node.JS, UI Components, Debugging, Mockups
Intermediate · Specialization · 1 - 4 Weeks

Skills you'll gain: Mobile Development, Cross Platform Development, .NET Framework, Authentications, User Interface (UI), Application Programming Interface (API), C# (Programming Language), Microsoft Visual Studio, Development Environment, Program Development, Data Access, Software Design Patterns
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security, Authentications
Intermediate · Professional Certificate · 3 - 6 Months

Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Infrastructure, Identity and Access Management, Google Cloud Platform, Infrastructure As A Service (IaaS), Cloud Applications, Kubernetes, Cloud Security, Prompt Engineering, Cloud Storage, Virtual Machines, Virtual Networking, Generative AI, Encryption, OAuth, Security Controls, Network Infrastructure, Cloud Computing, Threat Management, Data Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: API Testing, React.js, Containerization, Cloud Deployment, API Gateway, Software Documentation, Amazon Web Services, Cloud Applications, Front-End Web Development, Software Testing, Middleware, Test Automation, Technical Documentation
Advanced · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Information Systems Security, Mobile Security, Virtual Private Networks (VPN), Network Administration, Network Troubleshooting, Document Management, Malware Protection, Augmented and Virtual Reality (AR/VR), Change Control, Authentications
Advanced · Course · 1 - 3 Months

Amazon Web Services
Skills you'll gain: Serverless Computing, Amazon Web Services, Cloud Computing Architecture, Development Environment, Software Development Tools, Cloud Development, Software Development, Cloud Applications
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months