
DeepLearning.AI
Skills you'll gain: Full-Stack Web Development, Retrieval-Augmented Generation, Web Applications, JavaScript Frameworks, React.js, LLM Application, Web Development, Javascript, Tool Calling, Generative AI Agents, Data Persistence, Query Languages
Beginner · Project · Less Than 2 Hours

Amazon Web Services
Skills you'll gain: Cloud Security, Amazon Web Services, Encryption, AWS Identity and Access Management (IAM), Amazon S3, Data Security, Cryptography, Personally Identifiable Information
Mixed · Course · 1 - 4 Weeks

Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Cyber Risk, Security Strategy
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Data Storage Technologies, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Authentications, Hardware Architecture, Emerging Technologies
Beginner · Course · 1 - 3 Months

Arizona State University
Skills you'll gain: Supervised Learning, Unsupervised Learning, Matplotlib, File I/O, Generative Adversarial Networks (GANs), NumPy, Object Oriented Programming (OOP), Deep Learning, Image Analysis, Plot (Graphics), Machine Learning Algorithms, Object Oriented Design, Applied Machine Learning, Integrated Development Environments, Pandas (Python Package), Python Programming, Machine Learning, Event-Driven Programming, Programming Principles, Computer Programming
Beginner · Specialization · 3 - 6 Months

Infosec
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), Secure Coding, Package and Software Management, Node.JS, Vulnerability Management, Javascript, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Fortinet, Inc.
Skills you'll gain: Network Troubleshooting, Firewall, Network Monitoring, Network Security, Virtual Private Networks (VPN), Network Performance Management, Lightweight Directory Access Protocols, System Monitoring, Authentications, Performance Tuning, System Configuration, Cybersecurity, Malware Protection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Management, Vulnerability Assessments, Continuous Monitoring, Cloud Security, Threat Detection, Verification And Validation, Issue Tracking, Security Software, Data Pipelines, Data Import/Export
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Email Security, File Management, Control Panels, Web Analytics and SEO, MySQL, Apache, Cloud Hosting, Public Key Infrastructure, User Accounts, Data Security, Encryption, Database Management, Web Servers, Email Automation, System Configuration, PHP (Scripting Language), Server Administration, Performance Tuning, Content Management, Data Storage
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Cyber Security Assessment, Security Testing, Vulnerability Assessments, Penetration Testing, Vulnerability Scanning, Threat Modeling, Vulnerability Management, Security Strategy, Security Controls, Security Requirements Analysis, White-Box Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, DevOps, YAML, Continuous Deployment, Application Programming Interface (API), Authorization (Computing), Application Deployment, Role-Based Access Control (RBAC), Application Security, Authentications, Configuration Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Network Security, Firewall, Cyber Attacks, Data Security, Data Encryption Standard, Penetration Testing, Encryption, Information Assurance, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months