
Skills you'll gain: Cybersecurity, Threat Modeling, AI Enablement, AI Personalization, Artificial Intelligence, Incident Response, Deep Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript
Intermediate · Course · 1 - 3 Months

Pearson
Skills you'll gain: AI Security, Retrieval-Augmented Generation, AI Orchestration, Responsible AI, LangChain, AI Workflows, Threat Modeling, Generative AI, Vector Databases, Embeddings, Application Security, Secure Coding, Large Language Modeling, Open Web Application Security Project (OWASP), Threat Management, Security Testing, Security Controls, Prompt Engineering, MITRE ATT&CK Framework
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months
Skills you'll gain: AI Security, Application Security, Secure Coding, DevSecOps, Open Web Application Security Project (OWASP), Responsible AI, Threat Modeling, Vulnerability Scanning, AI Personalization, Continuous Integration, Code Review, PyTorch (Machine Learning Library), MLOps (Machine Learning Operations), Dependency Analysis, Analysis, Program Implementation, Supply Chain
Intermediate · Course · 1 - 4 Weeks

University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cybersecurity, Anomaly Detection, Cyber Threat Intelligence, Threat Detection, AI Security, Security Awareness, Network Analysis, Generative AI, Prompt Engineering, Email Security, Machine Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Operating Systems, C (Programming Language)
Intermediate · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Cybersecurity, Data Analysis, Data Science, Applied Machine Learning, Security Information and Event Management (SIEM), Pandas (Python Package), Interactive Data Visualization, Data Cleansing, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), AI Security, Responsible AI, API Testing, Penetration Testing, OpenAI, OpenAI API, Exploitation techniques, Vulnerability Scanning, Generative AI, Large Language Modeling
Beginner · Course · 1 - 3 Months

Coursera
Skills you'll gain: AI Security, Threat Modeling, Role-Based Access Control (RBAC), Cloud Security, Data Governance, Secure Coding, Data Security, DevSecOps, Infrastructure as Code (IaC), Zero Trust Network Access, Application Security, Security Controls, Security Requirements Analysis, Data Quality, Cyber Security Policies, Security Engineering, Compliance Management, Identity and Access Management, Vulnerability Management
Intermediate · Course · 3 - 6 Months