
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Digital Forensics, Security Requirements Analysis, Penetration Testing, Information Systems Security, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cybersecurity, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Sheets, Data Literacy, Data Visualization Software, Spreadsheet Software, Big Data, Data Storytelling, Data Analysis, Data Presentation, Google Cloud Platform, Data Integration, Data Manipulation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Power BI, Dashboard, No-Code Development, Data Visualization, Power Apps Component Framework, Business Intelligence, Business Process Automation, Application Development, Data Integration, Performance Analysis, Application Design, Automation, Data Security, Business Process, Computing Platforms, Microsoft Teams, Data Analysis Software, Data Modeling
Beginner · Specialization · 1 - 3 Months

University of Michigan
Skills you'll gain: Payment Systems, Payment Processing, Financial Inclusion, FinTech, Mobile Banking, Emerging Technologies, Point of Sale, Transaction Processing, Security Controls, Innovation, Digital Assets, Value Propositions
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Database Administration, Relational Databases, Database Management, Database Architecture and Administration, MySQL, Database Systems, IBM DB2, Operational Databases, PostgreSQL, Stored Procedure, Data Storage Technologies, Disaster Recovery, Role-Based Access Control (RBAC), Performance Tuning, Authentications, User Accounts
Intermediate · Course · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Cyber Security Strategy, Decision Making, Public Health
Beginner · Course · 1 - 3 Months

Pearson
Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Security Management, Network Security, Cyber Security Policies, Internet Of Things, Data Security, Wireless Networks, Emerging Technologies, Business Logic
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Recurrent Neural Networks (RNNs), Artificial Neural Networks, Machine Learning Methods, Deep Learning, Performance Tuning, Natural Language Processing
Advanced · Course · 1 - 4 Weeks

University of Michigan
Skills you'll gain: Stored Procedure, NoSQL, Database Design, Database Architecture and Administration, SQL, Relational Databases, Cloud Applications, PostgreSQL, Database Management Systems, Data Store, Databases, Database Theory, Data Modeling, JSON, Database Management, Query Languages, Cloud Deployment, Text Mining, Database Systems, Natural Language Processing
Intermediate · Specialization · 3 - 6 Months

University of Maryland, College Park
Skills you'll gain: Cryptography, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Cybersecurity, Communication Systems, Digital Communications, Authentications, Data Integrity, Algorithms
Mixed · Course · 1 - 3 Months