
LearnKartS
Skills you'll gain: Cloud Computing, Cost Management, Database Management, Resource Management
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Network Infrastructure, Cybersecurity
Beginner · Course · 1 - 4 Weeks

Illinois Tech
Skills you'll gain: Virtualization, Cloud-Native Computing, Network Security, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Virtual Machines, Network Troubleshooting, Cloud Platforms, Cloud Storage, Hyper-V, Virtual Networking, Software-Defined Networking, Cloud Infrastructure, VMware ESX Servers, Network Monitoring, Threat Modeling, Data Centers, Cloud Security
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Application Security, Secure Coding, Threat Modeling, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Healthcare Ethics, Responsible AI, Ethical Standards And Conduct, Computer Security Awareness Training, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Information Technology, Information Privacy, Diversity Equity and Inclusion Initiatives, Social Impact, Media and Communications, Automation, Robotics, Cultural Diversity, Personally Identifiable Information, Emerging Technologies
Build toward a degree
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Generative AI, Generative Adversarial Networks (GANs), AI Enablement, Recurrent Neural Networks (RNNs), Data Preprocessing, Model Evaluation
Beginner · Course · 1 - 4 Weeks

Technical University of Munich (TUM)
Skills you'll gain: Cybersecurity, Accident Prevention, Safety and Security, Infrastructure Security, Medical Science and Research, Threat Management, Physical Science, Environmental Monitoring, Continuous Monitoring, Risk Analysis, Physics
Intermediate · Course · 1 - 3 Months

Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Computer Security Incident Management, Risk Analysis, Threat Management, Cybersecurity, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Network Security, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Disaster Recovery
Intermediate · Specialization · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Continuous Monitoring, Medical Privacy, Risk Management, Health Information Management, Health Care Procedure and Regulation, Risk Mitigation, Information Privacy, Security Management, Risk Analysis, Patient Safety, Personally Identifiable Information, Information Systems Security, Security Controls, Data Security, Regulatory Compliance, Threat Modeling, Vulnerability Assessments
Beginner · Course · 1 - 3 Months
Universidad Austral
Skills you'll gain: Server Side, Node.JS, Back-End Web Development, Restful API, MongoDB, Application Deployment, OAuth, Web Servers, Application Servers, Web Applications, Authentications, Application Security, Object-Relational Mapping, NoSQL, Data Persistence, Authorization (Computing), Software Testing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, Computer Security Incident Management, User Accounts, Security Information and Event Management (SIEM), Authorization (Computing), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis, Authentications
Advanced · Course · 1 - 4 Weeks