
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Data Pipelines, Data Cleansing, Data Governance, Data Transformation, Cloud Security, Data Visualization, Extract, Transform, Load, Data Integration, Data Processing, Data Management, Data Migration, Data Collection, Cloud Computing, Cloud Storage, Data Analysis, SQL
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Network Troubleshooting, Network Monitoring, Network Administration, Network Security, Firewall, Ansible, Network Protocols, Software-Defined Networking, Puppet (Configuration Management Tool), Chef (Configuration Management Tool), Real Time Data, Scripting, JSON, Automation, Application Programming Interface (API)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Network Protocols, OSI Models, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity
Beginner · Course · 1 - 3 Months

Skills you'll gain: PyTorch (Machine Learning Library), Generative Model Architectures, Deep Learning, Image Analysis, Python Programming
Intermediate · Guided Project · Less Than 2 Hours

EC-Council
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
Beginner · Course · 1 - 3 Months

Pontificia Universidad Católica de Chile
Skills you'll gain: English Language, Language Competency, Vocabulary, Business Correspondence, Grammar, Sales Strategy, Business Communication, Oral Expression, Business Writing, Storytelling, Communication Strategies
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Services, Virtualization, Cloud Computing, Virtual Machines, Cloud Platforms, Cloud Storage, Cloud Infrastructure, Virtual Private Networks (VPN), Public Cloud, General Networking, Database Management Systems, Scalability
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months