Exploit development courses can help you learn vulnerability assessment, reverse engineering, and the exploitation of software flaws. You can build skills in writing exploits, understanding buffer overflows, and utilizing debugging techniques. Many courses introduce tools like GDB, Metasploit, and IDA Pro, that support analyzing and manipulating software vulnerabilities effectively.

Universiteit Leiden
Skills you'll gain: Policy Development, Policy Analysis, Data Ethics, Healthcare Ethics, Medical Privacy, Cultural Diversity, Liberal Arts, Ethical Standards And Conduct, Culture, Informed Consent, Healthcare Industry Knowledge, Biotechnology
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Applications, Node.JS, Application Deployment, Google Cloud Platform, Full-Stack Web Development, Web Applications, Server Side, Development Environment, Data Import/Export, Back-End Web Development, Data Store, Frontend Integration
Beginner · Project · Less Than 2 Hours

University of Colorado Boulder
Skills you'll gain: Kinesiology, Electrophysiology, Rehabilitation, Exercise Science, Human Musculoskeletal System, Sports Medicine, Physical Therapy, Neurology, Physiology, Geriatrics, Coordination, Anatomy, Mechanics, Cell Biology, Biology
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Git (Version Control System), GitHub, Version Control, Devops Tools, Collaborative Software, Software Configuration Management, Software Development Tools, Unix Shell, Command-Line Interface, Secure Coding
Intermediate · Course · 1 - 3 Months

The University of Tokyo
Skills you'll gain: Strategic Thinking, Entrepreneurship, Interviewing Skills, Design Thinking, Customer Insights, User Research, Product Development, Presentations, Business Planning, Market Opportunities, Team Management, Fundraising, Product Management, Growth Strategies
Beginner · Course · 1 - 3 Months

ESADE Business and Law School
Skills you'll gain: Technology Strategies, Business, Family Support, Innovation, Business Leadership, Business Management, Business Transformation, Economics, Industrial and Organizational Psychology, Entrepreneurship, Market Dynamics, Environmental Social And Corporate Governance (ESG), International Relations, Personal Development, Self-Awareness, Demography, Decision Making
Mixed · Course · 1 - 4 Weeks

AI Business School
Skills you'll gain: Agentic Workflows, Agentic systems, Productivity, No-Code Development, Sales Management, AI Product Strategy, AI Enablement, Business Process Automation, Automation, Artificial Intelligence, Digital Transformation, Application Development, Ideation
Intermediate · Course · 1 - 4 Weeks

Advancing Women in Tech
Skills you'll gain: Software Architecture, Systems Design, Technical Management, API Design, Technical Product Management, Engineering Management, Program Management, Microservices, Cross-Functional Collaboration, Team Performance Management, Leadership and Management, Service Oriented Architecture, Amazon Web Services
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, Plot (Graphics), Data Visualization, Large Language Modeling, Text Mining, Retrieval-Augmented Generation, Data Visualization Software, Data Analysis, Natural Language Processing
Intermediate · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: Spring Framework, Java, Dependency Analysis, Maintainability, Object Oriented Programming (OOP), Extensible Markup Language (XML), Software Design, Software Architecture, Testability
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Microsoft Azure, Artificial Intelligence, Data Ethics, Image Analysis, Natural Language Processing, Computer Vision, AI Workflows, No-Code Development, Model Deployment, Text Mining, Machine Learning, Model Evaluation
Beginner · Course · 1 - 4 Weeks

Board Infinity
Skills you'll gain: AI Security, Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Security Testing, Threat Modeling, Data Security, Security Controls, Cyber Security Assessment, Cybersecurity, Security Awareness, Threat Management, Continuous Monitoring, Authorization (Computing), Encryption, Penetration Testing, Data Management
Intermediate · Course · 1 - 4 Weeks