Skills you'll gain: Anomaly Detection, Fraud detection, Data Visualization, Generative AI, Risk Management, Risk Mitigation, ChatGPT, Data Synthesis, Compliance Management, AI Integrations, Test Data, AI Workflows, Data Pipelines, Automation
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface
Mixed · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Cyber Operations, Brute-force attacks, Intrusion Detection and Prevention, Network Security, Dynamic Host Configuration Protocol (DHCP), Network Routing, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks
CertNexus
Skills you'll gain: Data Ethics, Responsible AI, Accountability Frameworks, Risk Control, Accountability, Risk Management, Risk Analysis, Business Risk Management, Information Privacy, Risk Management Framework, Risk Mitigation, Personally Identifiable Information, Safety Assurance, Safety and Security, Safety Standards, Ethical Standards And Conduct, Artificial Intelligence, Diversity and Inclusion
Beginner · Course · 1 - 3 Months

University of Michigan
Skills you'll gain: Responsible AI, Data Ethics, AI literacy, AI powered creativity, Artificial Intelligence, Generative AI, Creativity, Ethical Standards And Conduct, Risk Management Framework, Environmental Issue, Analysis, Intellectual Property, Leadership
Beginner · Course · 1 - 3 Months

Edureka
Skills you'll gain: AI Security, Responsible AI, Data Ethics, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Data Security, LLM Application, Cyber Attacks, Security Awareness, Large Language Modeling, Generative AI Agents
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis
Intermediate · Course · 1 - 3 Months

Northeastern University
Skills you'll gain: Responsible AI, Data Ethics, Artificial Intelligence, Data Governance, Artificial Intelligence and Machine Learning (AI/ML), Dependency Analysis, Law, Regulation, and Compliance, Machine Learning, Ethical Standards And Conduct, Data-Driven Decision-Making, Data Integrity, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Risk Management Framework, Model Evaluation, Data Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Threat Intelligence, Generative AI, Security Testing, Responsible AI, AI Integrations
Beginner · Course · 1 - 4 Weeks