
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Zero Trust Network Access, Microsoft Azure, Cloud Platforms, Azure Active Directory, Cloud Security, Endpoint Detection and Response, Security Controls, Multi-Factor Authentication, Cloud Services, Cyber Security Strategy, Identity and Access Management, Data Security, Enterprise Security, Data Governance, Encryption
Beginner · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Anomaly Detection, Threat Modeling, Cyber Security Strategy, Security Controls, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Beginner · Specialization · 3 - 6 Months

Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, Infrastructure as Code (IaC), Security Controls, Google Cloud Platform, Cybersecurity, Identity and Access Management
Beginner · Course · 1 - 4 Weeks

DeepLearning.AI
Skills you'll gain: Apache Airflow, Data Pipelines, Data Integration, AWS Kinesis, Infrastructure as Code (IaC), Terraform, Extract, Transform, Load, Amazon CloudWatch, Data Quality, Amazon Web Services, CI/CD, Data Processing, Data Transformation, NoSQL
Intermediate · Course · 1 - 4 Weeks

Icahn School of Medicine at Mount Sinai
Skills you'll gain: Bioinformatics, Unsupervised Learning, Biostatistics, Biology, Machine Learning Algorithms, Data Processing, Statistical Methods, Systems Engineering, Unix Commands, Linux Commands
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, MITRE ATT&CK Framework, Kubernetes, Role-Based Access Control (RBAC), Hardening, Incident Response, Identity and Access Management, Infrastructure Security, Threat Management, Network Security, DevSecOps, Cloud-Native Computing, Threat Detection, Intrusion Detection and Prevention, Public Key Infrastructure, Cloud Security, Firewall, Continuous Monitoring, Application Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning
Advanced · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
Beginner · Course · 1 - 3 Months

L&T EduTech
Skills you'll gain: Engineering Drawings, Construction Engineering, Hydraulics, Mechanical Design, Blueprint Reading, Petroleum Industry, Building Codes, Process Flow Diagrams, Civil Engineering, Oil and Gas, Construction Inspection, Failure Analysis, Construction, Engineering Analysis, Engineering Calculations, Engineering Plans And Specifications, Energy and Utilities, Mechanical Engineering, Chemical Engineering, Process Engineering
Intermediate · Specialization · 3 - 6 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months