
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Risk, Vulnerability Management, Incident Response, Network Architecture
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Beginner · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Identity and Access Management, Network Monitoring, Google Cloud Platform, Virtual Private Networks (VPN), General Networking, Network Troubleshooting, Virtual Local Area Network (VLAN), Network Security, Network Architecture, Network Routing, Cloud Computing, Cloud Security, Firewall, Key Management, Load Balancing, Cloud Storage, DevOps, Encryption, Automation
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Game Theory, Data-Driven Decision-Making, Cybersecurity, Data Science, Algorithms, Reinforcement Learning, Machine Learning Algorithms, Applied Machine Learning, Machine Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Application Security, Security Strategy, Security Controls, Security Requirements Analysis, Data Security, Security Information and Event Management (SIEM)
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Information Privacy, Responsible AI, Personally Identifiable Information, Data Security, Data Ethics, General Data Protection Regulation (GDPR), Risking, Data Governance, Data Management, Incident Response, Cyber Security Policies, Compliance Management, Cyber Security Strategy, Artificial Intelligence, Governance, Data Science, Cybersecurity, Stakeholder Engagement, Cyber Operations, Algorithms
Beginner · Course · 1 - 3 Months

University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, Google Cloud Platform, Data Lakes, Cloud Storage, Data Security, Data Access, Role-Based Access Control (RBAC), Cloud Computing, Big Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Johns Hopkins University
Skills you'll gain: Precision Medicine, Clinical Trials, Data Analysis, Data-Driven Decision-Making, Analytics, Data Science, Strategic Decision-Making, Root Cause Analysis, Random Forest Algorithm, Treatment Planning, Personalized Service, A/B Testing, Machine Learning, Online Advertising
Intermediate · Course · 1 - 3 Months

New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geographic Information Systems, Geospatial Information and Technology, Encryption, Data Security, Network Security, Public Key Infrastructure, Wireless Networks, Extensible Markup Language (XML)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
Intermediate · Course · 1 - 4 Weeks