
Starweaver
Skills you'll gain: Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Document Management, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Cryptography, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

Skills you'll gain: Crisis Management, Data Ethics, Governance, Business Ethics, Strategic Leadership, Responsible AI, Law, Regulation, and Compliance, Media Relations, Strategic Thinking, Communication Strategies, Business Leadership, Accountability, Ethical Standards And Conduct, Emerging Technologies, Organizational Leadership, Risk Management, Communication, Leadership, Test Planning, Learning Strategies
Beginner · Professional Certificate · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Healthcare Ethics, Ethical Standards And Conduct, Responsible AI, Data Security, Data Science, Medical Privacy, Machine Learning Algorithms, Algorithms, Information Privacy, Artificial Intelligence, Diversity Awareness, Case Studies
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Security Assessment, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Microsoft Windows
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Data Import/Export, Public Key Infrastructure, MySQL, Vulnerability Scanning, Encryption, Vulnerability Assessments, Cybersecurity, Data Encryption Standard, SQL, PostgreSQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Responsible AI, AI Personalization, Data Ethics, Information Privacy, Persona (User Experience), User Research, Multimodal Prompts, Diversity Awareness, Persona Development, User Experience Design, Usability, Artificial Intelligence, Accountability, Human Centered Design, Ethical Standards And Conduct, User Centered Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Hardening, Risk Analysis
Advanced · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Exploit development, Vulnerability Assessments, Network Analysis, Linux, System Configuration, Virtual Machines, Operating Systems
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
Intermediate · Course · 1 - 4 Weeks