
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Text Mining, Natural Language Processing, Microsoft Azure, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Application Development
Beginner · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Internet Of Things, Manufacturing Operations, Digital Transformation, Business Technologies, Business Transformation, Cloud Computing, Automation, Operational Efficiency, Emerging Technologies, System Implementation, Technology Strategies, Real Time Data, Value Propositions, Data-Driven Decision-Making, Case Studies, Cybersecurity, Scalability
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Tidyverse (R Package), Web Scraping, Data Manipulation, R Programming, Data Transformation, Data Cleansing, Data Science, Big Data, Statistical Programming, Text Mining, Application Programming Interface (API)
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Performance Tuning, OS Process Management, Data Structures, C and C++, Performance Testing, Distributed Computing, Hardware Architecture, Algorithms, Computer Architecture, Program Development, Debugging
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Dataflow, Data Pipelines, Serverless Computing, Identity and Access Management, Google Cloud Platform, Cloud Security, Data Integrity, Performance Tuning, Data Security, CI/CD, Data Processing, Debugging, Real Time Data, System Monitoring, Cloud Storage, Data Storage Technologies, Extract, Transform, Load, Unit Testing, Containerization, Data Transformation
Intermediate · Specialization · 3 - 6 Months

Packt
Skills you'll gain: Threat Management, Threat Modeling, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking
Beginner · Specialization · 1 - 4 Weeks

Skills you'll gain: Exploratory Data Analysis, NumPy, Data Visualization, Data Analysis, Seaborn, Matplotlib, Cloud Computing, Jupyter, Dimensionality Reduction, Data Science, Unsupervised Learning, Applied Machine Learning, Python Programming, Linear Algebra
Intermediate · Guided Project · Less Than 2 Hours

ISC2
Skills you'll gain: Cloud Security, Zero Trust Network Access, Hybrid Cloud Computing, Cloud Computing, Cloud Services, Cloud Solutions, Risk Mitigation, Cloud Platforms, Security Controls, Security Strategy, Legal Risk, Regulation and Legal Compliance, Information Privacy, Auditing
Intermediate · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Bayesian Statistics, Machine Learning Algorithms, Statistical Analysis, Data Visualization, Statistical Inference, Data Analysis, Regression Analysis, Data Cleansing, Analytics, Statistical Modeling, Machine Learning, Statistical Software, R Programming, Data Science, Statistical Programming, Statistical Methods, R (Software), Data Validation, Data Manipulation, Exploratory Data Analysis
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

University of Alberta
Skills you'll gain: Reinforcement Learning, Deep Learning, Feature Engineering, Machine Learning, Supervised Learning, Artificial Neural Networks, Pseudocode, Linear Algebra, Probability Distribution
Intermediate · Course · 1 - 3 Months
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Enterprise Risk Management (ERM), Business Risk Management, Security Strategy
Beginner · Specialization · 1 - 3 Months