University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, FinTech, Data Sharing, Transaction Processing, Fraud detection, Distributed Computing, Payment Systems, Data Integrity, Emerging Technologies, Digital Assets, Authentications, Software Systems, Systems Architecture, Data Security, Computer Systems, Software Architecture, Network Security, Software Versioning
Beginner · Specialization · 3 - 6 Months

Erasmus University Rotterdam
Skills you'll gain: Microsoft Excel, Excel Formulas, Data Modeling, Verification And Validation, Financial Modeling, Business Modeling, Spreadsheet Software, Technical Documentation, Product Testing, Data Validation, Data Integrity, Data Management, Organizational Skills
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Excel, Pivot Tables And Charts, Excel Formulas, Spreadsheet Software, Business Reporting, Data Visualization, Excel Macros, Dashboard, Forecasting, Data Analysis, Data Visualization Software, Predictive Modeling, Data Validation, Productivity Software, Data Entry, Data Management, Financial Modeling, Data Security, Data Integrity, Computer Literacy
Beginner · Specialization · 1 - 3 Months

Alibaba Cloud Academy
Skills you'll gain: Relational Databases, Load Balancing, Data Visualization Software, Cloud Security, Network Security, Cloud Computing, Big Data, Database Management, Apache Hadoop, Cloud Infrastructure, Cloud Computing Architecture, Network Architecture, Apache Spark, Data Security, Servers, Apache Hive, Application Security, Distributed Computing, Data Processing, Machine Learning
Beginner · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Disaster Recovery, Security Controls
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Brute-force attacks, Web Scraping
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Data Cleansing, Prompt Engineering, Data Processing, Microsoft Excel, Data Manipulation, Microsoft Copilot, Data Preprocessing, Data Quality, Data Transformation, Data Integrity, Data Validation, Data-Driven Decision-Making, Excel Formulas, Data Analysis
Beginner · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Vulnerability Management, Cyber Governance, Threat Modeling, Network Security, Cyber Threat Intelligence, Malware Protection, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Hardening, Threat Detection, Security Strategy, Application Security, Mobile Security, Business Risk Management, Cyber Security Policies, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Looker (Software), Ad Hoc Analysis, Dashboard, Data Analysis, Exploratory Data Analysis, Data Literacy, Database Application
Beginner · Project · Less Than 2 Hours

Duke University
Skills you'll gain: Bash (Scripting Language), Linux Commands, Shell Script, Linux, Linux Administration, Unix Shell, File Management, Unix, Unix Commands, File Systems, Scripting, Command-Line Interface, Scripting Languages, Remote Access Systems, Data Manipulation, Data Processing, Data Management, Development Environment
Intermediate · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Operating Systems, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Cryptography, NoSQL, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months