
University of Illinois Urbana-Champaign
Skills you'll gain: Internet Of Things, Embedded Software, Wireless Networks, Network Protocols, Infrastructure Security, Data Science, Embedded Systems, General Networking, Network Planning And Design, Big Data, Amazon Web Services, Cloud Platforms, Computer Hardware
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: ASP.NET, .NET Framework, Responsive Web Design, API Design, Restful API, Middleware, Data Migration, Configuration Management, Application Deployment, Data Validation, HTML and CSS, Database Application, Software Testing, C# (Programming Language), Postman API Platform, Full-Stack Web Development, Microsoft Azure, Web Applications, Web Development, Javascript and jQuery
Intermediate · Professional Certificate · 3 - 6 Months

Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
Intermediate · Course · 1 - 3 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Cyber Attacks, Threat Detection, Network Security, Data Integrity, Data Storage, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
Beginner · Course · 1 - 3 Months

Duke University
Skills you'll gain: Blockchain, Digital Assets, Portfolio Management, Cryptography, Investments, Market Dynamics, Financial Market, Transaction Processing, Financial Regulation, Business Economics, Production Process
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Encryption, Secure Coding, File Management, Cryptography, Python Programming, Programming Principles, Debugging, Scripting, Data Structures
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Power BI, Microsoft Power Platform, Data Modeling, Data Storytelling, Business Intelligence, Interactive Data Visualization, Data Analysis Expressions (DAX), Dashboard, Data Transformation, Data Presentation, Data Visualization Software, Extract, Transform, Load, Data Manipulation, Data Cleansing
Beginner · Course · 1 - 3 Months

Skills you'll gain: Google Gemini, Google Workspace, Generative AI, Google Cloud Platform, Enterprise Security, LLM Application, Responsible AI, Workflow Management, Prompt Engineering
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
Beginner · Specialization · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: FinTech, Financial Regulation, Business Continuity Planning, Compliance Management, Disaster Recovery, Financial Regulations, Operational Risk, Bank Regulations, Risk Management, Business Risk Management, Financial Industry Regulatory Authorities, Financial Services, Law, Regulation, and Compliance, Governance, IT Management, Information Assurance, Market Trend, Emerging Technologies, Banking, Blockchain
Beginner · Specialization · 3 - 6 Months

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, IT Management, Encryption, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months