Skills you'll gain: Vulnerability Assessments, Network Security, Vulnerability Scanning, Security Engineering, Telecommunications, Infrastructure Security, Cyber Security Assessment, IT Security Architecture, Threat Detection, Security Architecture Review, Network Analysis, Continuous Monitoring, Security Strategy, Cloud Security, Security Controls, Network Infrastructure, Internet Of Things, vSAN ESA, Emerging Technologies, Infrastructure Architecture
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Model Training, Anomaly Detection, Model Deployment, Generative AI Agents, Artificial Intelligence and Machine Learning (AI/ML), Generative AI, Predictive Modeling, Deep Learning, Artificial Intelligence, Telecommunications, Network Performance Management, Emerging Technologies, Responsible AI, Network Architecture, Wireless Networks, Computer Networking, Network Protocols, System Design and Implementation, Digital Communications, Communication
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Anomaly Detection, Malware Protection, Threat Detection, Network Analysis, AI Security, Cybersecurity, Model Evaluation, Network Security, Machine Learning Methods, Classification Algorithms, Microsoft Windows
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Internet Of Things, Cyber Governance, Information Systems Security, Cybersecurity, Systems Development Life Cycle, Emerging Technologies, Software Development Life Cycle, Program Development, Prototyping, PIC Microcontrollers, Information Privacy, Safety and Security, Field-Programmable Gate Array (FPGA), Electrical Wiring, Power Electronics, Electric Power Systems, Electrical Equipment, Basic Electrical Systems, Microarchitecture, Electrical Power
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Prompt Engineering, ChatGPT, Incident Response, Prompt Patterns, Prompt Engineering Tools, Responsible AI, Cyber Threat Intelligence, Computer Security Incident Management, AI Security, Vulnerability Management, Data Ethics, Incident Management, Vulnerability Assessments, Security Awareness, Cybersecurity, IT Automation, Computer Security Awareness Training, Cyber Security Strategy, AI Integrations, Threat Detection
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Embedded Software, Unified Modeling Language, Systems Development Life Cycle, Embedded Systems, Internet Of Things, Software Development Life Cycle, Systems Architecture, Systems Design, System Design and Implementation, Software Design, Systems Engineering, Diagram Design, Requirements Analysis, Requirements Elicitation
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Security Architecture Review, Investigation, Cyber Security Assessment, IT Security Architecture, Failure Analysis, Root Cause Analysis
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Cryptography, Cryptographic Protocols, Key Management, Security Engineering, Threat Modeling, Security Management, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, Routing Protocols, TCP/IP, Internet Of Things, Network Security, Cyber Attacks, Threat Detection, Network Monitoring, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software), Containerization
Intermediate · Course · 1 - 3 Months

Pohang University of Science and Technology(POSTECH)
Skills you'll gain: Internet Of Things, Cloud Applications, Cloud Development, Cloud Platforms, IBM Cloud, Application Development, Cloud Services, Cloud Technologies, Cloud Computing, Google Cloud Platform, Cloud-Based Integration, Microsoft Azure, AI Integrations, Amazon Web Services, Emerging Technologies, Network Protocols, Dataflow
Beginner · Course · 1 - 3 Months