
Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
Beginner · Course · 1 - 3 Months

Skills you'll gain: Web Services, Data Mapping, Simple Object Access Protocol (SOAP), Restful API, Application Development, Cloud Applications, Application Programming Interface (API), Microservices, System Monitoring, Application Performance Management, Data Integration, Enterprise Application Management, Software Architecture, Business Process Automation, Maintainability, Scalability, Debugging, Application Security, Role-Based Access Control (RBAC)
Advanced · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months

Skills you'll gain: Pivot Tables And Charts, Microsoft Excel, Spreadsheet Software, Excel Macros, Data Analysis, Data Visualization Software, Data Security, Data Integrity, Automation
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Cloud-Native Computing, Cloud Computing Architecture, React Redux, Cloud Applications, Cloud Services, Node.JS, NoSQL, MongoDB, Server Side, Agile Methodology, React.js, IBM Cloud, Cloud Security, Hypertext Markup Language (HTML), HTML and CSS, JavaScript Frameworks, Cloud Infrastructure, Hybrid Cloud Computing, DevOps, Python Programming
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption
Intermediate · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud Infrastructure, Prompt Engineering, Containerization, Identity and Access Management, Cloud-Native Computing, CI/CD, Cloud Storage, Application Deployment, Cloud Management, Cloud Services, Virtual Machines, Scalability, Cloud Computing, Docker (Software), Application Development, Load Balancing, Generative AI Agents, Continuous Integration
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Beginner · Course · 1 - 3 Months

Skills you'll gain: People Analytics, Workday (Software), Registration, Business Process, Workflow Management, Business Reporting, Data Entry, Organizational Structure, Business Analytics, No-Code Development, Enterprise Resource Planning, Data Management, Data Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: AI Product Strategy, Responsible AI, Strategic Leadership, Technology Roadmaps, Artificial Intelligence, Milestones (Project Management), Agile Project Management, Business Strategy, Compliance Management, Data Management, Security Controls, Systems Design, Artificial Intelligence and Machine Learning (AI/ML), Governance, Ethical Standards And Conduct, Data Governance, Team Management, Team Building, Innovation, Talent Management
Advanced · Course · 3 - 6 Months

New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Intermediate · Course · 1 - 4 Weeks