
Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Hardware, Operating Systems, Databases, Hardware Troubleshooting, Information Technology, Technical Support, System Configuration, Security Controls, Wireless Networks, Software Installation, Computer Networking, Computer Security Awareness Training, Peripheral Devices
Beginner · Course · 3 - 6 Months

Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Power Platform, No-Code Development, Cloud Applications, Application Development, Data Management, Responsive Web Design, UI Components, Business Process Automation, Role-Based Access Control (RBAC), Generative AI, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: C++ (Programming Language), Data Structures, Interactive Design, Other Programming Languages, Application Development, Program Development, Computer Programming, Java Programming, Software Development, Computer Science
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Microsoft Project, Earned Value Management, Work Breakdown Structure, Project Schedules, Resource Allocation, Calendar Management, Project Controls, Excel Macros, Project Performance, Resource Management, Timelines, Business Reporting, Resource Planning, Milestones (Project Management), Scheduling, Cost Management, Project Management, Capacity Management, Dependency Analysis, Consolidation
Intermediate · Course · 3 - 6 Months
University of London
Skills you'll gain: Applied Machine Learning, Artificial Intelligence, Machine Learning, Computer Vision, Data Literacy, Data Processing
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Hardware Troubleshooting, Computer Networking, Network Protocols, Web Applications, Computer Security Awareness Training, Network Routers, Wireless Networks, Technical Support and Services, Encryption, Security Awareness, Computer Literacy, System Configuration, Microsoft Office, Authentications, Microsoft Windows, Peripheral Devices, Patch Management, Technical Support, Mac OS, Database Management
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Feature Engineering, Responsible AI, Tensorflow, Exploratory Data Analysis, Keras (Neural Network Library), Google Cloud Platform, Data Quality, Applied Machine Learning, Data Cleansing, Machine Learning, Data Strategy, MLOps (Machine Learning Operations), Machine Learning Algorithms, Supervised Learning, Data Processing, Dataflow, Deep Learning, Data Analysis, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Kubernetes, Cloud Security, Google Cloud Platform, Encryption, OAuth, Identity and Access Management, Security Controls, Authorization (Computing), Application Security, Authentications, Cloud API, Data Security, Data Access, Key Management, Role-Based Access Control (RBAC), Cloud Storage, Virtual Machines, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months