
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Package and Software Management, Linux Administration, Linux, User Accounts, Command-Line Interface, Operating System Administration, Open Source Technology, Disaster Recovery, Red Hat Enterprise Linux, System Monitoring, Unix Commands, System Configuration, Identity and Access Management, Data Storage Technologies, Systems Administration, Linux Commands, Configuration Management, Patch Management, Security Controls, Software Installation
Mixed · Course · 1 - 3 Months

Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Exploit development, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Exploitation techniques, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Persistence, Python Programming, Data Access, Computer Programming
Intermediate · Specialization · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Incident Response, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Unsupervised Learning, Supervised Learning, Deep Learning, Artificial Neural Networks
Intermediate · Course · 1 - 3 Months

Institut Mines-Télécom
Skills you'll gain: Wireless Networks, Network Security, Network Architecture, Computer Networking, Network Infrastructure, Mobile Security, Network Protocols, Telecommunications, Digital Communications, Dataflow, Capacity Management
Intermediate · Course · 1 - 3 Months

Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Microsoft Office, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Generative AI, Operating Systems, Collaborative Software, System Support, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Cloud Computing
Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Microsoft 365, Microsoft Power Automate/Flow, Microsoft Power Platform, Data Governance, Data Migration, Business Process Automation, Content Management, Microsoft Teams, Microsoft Office, Trend Analysis, Document Management, Strategic Thinking, Strategic Planning, System Configuration, Compliance Management, Technology Roadmaps, Microsoft Copilot, Data Security, Application Development
Intermediate · Course · 1 - 3 Months

Coursera
Skills you'll gain: Cyber Threat Intelligence, Responsible AI, Cybersecurity, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, AI Product Strategy, Data Ethics, Security Testing, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks

Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
Beginner · Course · 1 - 4 Weeks

Georgia Institute of Technology
Skills you'll gain: Structural Analysis, Mechanical Engineering, Failure Analysis, Engineering Analysis, Mechanics, Materials science, Engineering Calculations, Civil Engineering, Mathematical Modeling, Trigonometry
Mixed · Course · 1 - 3 Months

Skills you'll gain: Power BI, Data Analysis Expressions (DAX), Dashboard, SQL, Microsoft SQL Servers, Data Security, Data Analysis, Data Visualization Software, Data Modeling, Data Management, Role-Based Access Control (RBAC)
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
Intermediate · Course · 1 - 4 Weeks