
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Information Assurance, Incident Response
Build toward a degree
Beginner · Course · 1 - 4 Weeks

University of Alberta
Skills you'll gain: Service Oriented Architecture, API Design, Web Services, Simple Object Access Protocol (SOAP), Microservices, Restful API, Software Architecture, Web Applications, JSON, Web Development, Android Development
Intermediate · Course · 1 - 4 Weeks

Scrimba
Skills you'll gain: Model Context Protocol, Prompt Engineering, Retrieval-Augmented Generation, LangChain, OpenAI API, Embeddings, Image Analysis, Responsible AI, AI Workflows, LLM Application, Cloud Deployment, Cloud Applications, Multimodal Prompts, Hugging Face, Generative AI, Application Deployment, OpenAI, API Gateway, Vector Databases, Software Engineering
Intermediate · Specialization · 3 - 6 Months

28DIGITAL
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Internet Of Things, Security Requirements Analysis, Network Architecture, Network Security, Operating Systems, Cybersecurity, Web Services, Encryption, Network Protocols, Public Key Cryptography Standards (PKCS), System Programming, Simple Object Access Protocol (SOAP), Application Development, System Requirements, C (Programming Language), System Design and Implementation, Software Development
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Electrical Power, Electric Power Systems, Electrical Systems, Control Systems, Electrical Substation, Electrical Equipment, Energy and Utilities, Electrical Safety, Plant Operations and Management, High Voltage, Applied Mathematics, Power Electronics, Automation Engineering, Basic Electrical Systems, Electrical Engineering, Low Voltage, Process Control, Mathematical Modeling, Matlab, Three-Phase
Intermediate · Specialization · 3 - 6 Months

The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Governance, Network Infrastructure, Conflict Management, Security Management, Political Sciences, Media and Communications, Psychology
Mixed · Course · 1 - 3 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Brute-force attacks, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Excel Macros, Visual Basic (Programming Language), Data Import/Export, Programming Principles, Spreadsheet Software, UI Components, User Interface (UI), Automation, File I/O, Debugging, Data Validation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, Anthropic Claude, Vibe coding, Model Context Protocol, OpenAI API, LLM Application, Context Management, Debugging, ChatGPT, Generative AI, Large Language Modeling, Multimodal Prompts, Pseudocode, AI Workflows, Artificial Intelligence, Responsible AI, AI Enablement, Software Installation, Web Development Tools, Software Development
Intermediate · Specialization · 1 - 3 Months

New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks