
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Data Ethics, Generative AI, AWS SageMaker, Cloud Security, MLOps (Machine Learning Operations), Data Security, Role-Based Access Control (RBAC), Data Governance, Artificial Intelligence, Encryption, Public Cloud, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, ChatGPT, No-Code Development, OpenAI, LLM Application, Generative AI, Microsoft Power Platform, Application Programming Interface (API), Email Automation, Application Development, Microsoft Power Automate/Flow, Serverless Computing, Microsoft Azure, Microsoft Outlook, Email Marketing
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Disaster Recovery, Relational Databases, Database Architecture and Administration, Oracle Databases, Data Storage Technologies, Data Migration, Key Management, Data Integrity, Encryption, Data Loss Prevention, Data Security
Advanced · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: API Gateway, Cloud API, Application Programming Interface (API), Capacity Management, Google Cloud Platform, Scalability, Application Security, Hybrid Cloud Computing, Security Controls, Proxy Servers, Data Security, Application Deployment, Role-Based Access Control (RBAC), Development Environment, Encryption, Debugging
Beginner · Course · 1 - 3 Months

Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Embedded Software, Software Design, Linux, System Programming, System Design and Implementation, Performance Tuning, Verification And Validation, Algorithms, Debugging
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Identity and Access Management, Cloud Services, Microsoft Azure, Collaborative Software, Microsoft Teams, Security Controls, Endpoint Security, Cloud Solutions, Zero Trust Network Access, Microsoft Office, Cloud Computing, Information Privacy
Beginner · Course · 3 - 6 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Encryption, Data Structures, Virtualization and Virtual Machines, Network Protocols, Distributed Computing, Algorithms
Intermediate · Course · 1 - 3 Months

Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cloud Management, Distributed Denial-Of-Service (DDoS) Attacks, Containerization, Real Time Data, Cloud Infrastructure, Digital Transformation, Data Governance, Google Cloud Platform, Application Programming Interface (API), Cloud Computing, Serverless Computing, Encryption, Cloud Security, Public Cloud, Data Management, Looker (Software), Cost Management, Cloud Storage, Responsible AI, Artificial Intelligence
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Security Controls, User Accounts, Key Management, Encryption, Command-Line Interface
Beginner · Course · 1 - 3 Months