
Advancing Women in Tech
Skills you'll gain: Amazon Web Services, Cloud Computing, Amazon S3, Cloud Storage, Technical Product Management, Cloud Services, Cloud Security, Cloud Infrastructure, Amazon Elastic Compute Cloud, AWS Identity and Access Management (IAM), Amazon DynamoDB, Cloud Computing Architecture, AWS CloudFormation, Network Architecture, Amazon Redshift, Data Security, Databases, Innovation, Technical Support, Product Management
Build toward a degree
Beginner · Specialization · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Algorithms
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Database Administration, Microsoft SQL Servers, Microsoft Azure, Database Management, Transact-SQL, Database Architecture and Administration, Performance Tuning, SQL, Cloud Computing, Azure Active Directory, Cloud Security, Disaster Recovery, Data Migration, Data Security, Virtual Machines, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Data Ethics, Regulation and Legal Compliance, Generative AI, Legal Risk, Operational Risk, Business Ethics, Intellectual Property, Business Risk Management, Personally Identifiable Information, Data Security
Beginner · Course · 1 - 4 Weeks

UNSW Sydney (The University of New South Wales)
Skills you'll gain: Design Thinking, Business Transformation, Workforce Development, Strategic Thinking, Automation, Digital Transformation, Human Centered Design, Emerging Technologies, Innovation, Service Design, Business Process Automation, Forecasting, Organizational Change
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Role-Based Access Control (RBAC), Authorization (Computing), User Accounts, Cloud Security, Data Security, Cloud Platforms, Command-Line Interface
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: AI Personalization, Generative AI, Responsible AI, Data Ethics, Education Software and Technology, ChatGPT, LLM Application, Prompt Engineering, Artificial Intelligence, Ethical Standards And Conduct, Information Privacy, Emerging Technologies, Data Security
Intermediate · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Risk Management, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Cryptography
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Computing, Incident Response, IT Security Architecture, Capacity Management, Application Security, Security Controls, Network Security, Hardening, Scalability, Emerging Technologies, Identity and Access Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months