
Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, FinTech, Payment Systems, Cryptography, Digital Assets, Emerging Technologies, Distributed Computing, Cryptographic Protocols, E-Commerce, Transaction Processing, Algorithms, Fundraising
Beginner · Course · 1 - 3 Months

University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Cloud Applications, Application Security, Secure Coding, DevSecOps, Cloud Computing, Identity and Access Management, Multi-Factor Authentication, Distributed Denial-Of-Service (DDoS) Attacks, Web Services
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Kubernetes, Cloud Security, Google Cloud Platform, Cloud Storage, Encryption, Application Security, Data Encryption Standard, Cloud API, Authorization (Computing), Data Security, Continuous Monitoring, Role-Based Access Control (RBAC), Virtual Machines, Cryptography, Key Management, Authentications, Cloud Applications, Vulnerability Scanning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Storage, Data Storage, Microsoft Azure, Data Storage Technologies, Cloud Applications, Data Architecture, Cloud Security, Data Management, Data Security, Application Development, Key Management, Authentications, Unstructured Data, Analytics
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Cloud Infrastructure, Google Cloud Platform, Cloud Computing, Cloud Services, Cloud Computing Architecture, Cloud Storage, Data Storage Technologies, Key Management, Security Controls, System Monitoring
Intermediate · Course · 1 - 3 Months

LearnQuest
Skills you'll gain: Blockchain, Interoperability, Network Architecture, Solution Architecture, Information Technology Architecture, Enterprise Architecture, Cryptography, Identity and Access Management, Emerging Technologies, Encryption, Threat Modeling, Systems Integration, Information Privacy, Scalability, Security Testing, Requirements Analysis, Prototyping
Intermediate · Course · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Algorithms
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Cloud Security, Infrastructure Security, Kubernetes, Data Security, Virtual Machines, Remote Access Systems, Role-Based Access Control (RBAC), Data Storage Technologies, Identity and Access Management, Databases, Containerization, Key Management, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Natural Language Processing, Deep Learning, Large Language Modeling, Text Mining, Semantic Web, Generative AI, PyTorch (Machine Learning Library), Artificial Neural Networks, Python Programming, Cryptography, Generative Model Architectures, Applied Machine Learning, Machine Learning Methods, Unsupervised Learning, Probability Distribution, Machine Learning Algorithms, Algorithms
Intermediate · Specialization · 3 - 6 Months

Google - Spectrum Sharing
Skills you'll gain: Key Management, Communication Systems, Interoperability, Configuration Management, Telecommunications, Wireless Networks, Data Validation, Geographic Information Systems
Advanced · Course · 1 - 3 Months

Skills you'll gain: Microsoft Azure, Identity and Access Management, Network Security, Cloud Security, Security Management, Authorization (Computing), Data Access, Security Information and Event Management (SIEM), Firewall, Role-Based Access Control (RBAC), Continuous Monitoring, Key Management, Threat Detection, IT Automation, Incident Management
Intermediate · Course · 1 - 4 Weeks