
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Secure Coding, Artificial Intelligence, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Data Ethics, Authentications
Build toward a degree
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: File Transfer Protocol (FTP), Transaction Processing, Integration Testing, Data Integration, Data Mapping, Data Validation, Test Case, Middleware, Systems Integration, Databases
Mixed · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Exploit development, C (Programming Language), C++ (Programming Language), Secure Coding, Application Security, System Programming, Debugging, Vulnerability Assessments
Mixed · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Azure Synapse Analytics, Microsoft Azure, Microsoft SQL Servers, SQL, Database Management, Databases, Data Integration, Managed Services, Data Migration, Cloud Services
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Azure Active Directory, Authentications, Microsoft Azure, Authorization (Computing), Network Security, Virtual Private Networks (VPN), Identity and Access Management, Firewall, Active Directory, Cloud Security, User Provisioning, Security Management, Role-Based Access Control (RBAC), Virtual Networking, Kubernetes, Single Sign-On (SSO), User Accounts, Data Security, Data Access, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Project Closure, Agile Project Management, Product Roadmaps, Project Management, Agile Software Development, Stakeholder Engagement, Backlogs, Procurement, Scope Management, Project Management Life Cycle, Agile Methodology, Project Controls, Project Risk Management, Project Planning, Project Schedules, Project Scoping, Project Estimation, Project Implementation, Waterfall Methodology, Project Performance
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Relational Databases, Databases, Spreadsheet Software, Collaborative Software, Project Management Software, Cloud Services, Collaboration, Cloud Computing, Data Import/Export
Beginner · Guided Project · Less Than 2 Hours

Fundação Instituto de Administração
Skills you'll gain: Marketing Strategies, Market Research, Strategic Marketing, Marketing Management, Marketing Analytics, Market Intelligence, Data-Driven Decision-Making, Customer Insights, Consumer Behaviour, Target Market, A/B Testing, Digital Marketing, Statistical Hypothesis Testing
Beginner · Course · 1 - 4 Weeks

Automatic Data Processing, Inc. (ADP)
Skills you'll gain: Benefits Administration, Compensation and Benefits, Financial Services, Compensation Management, Employee Retirement Income Security Act, Insurance, Communication, Technical Communication, Administration, Program Evaluation, Employee Engagement
Beginner · Course · 1 - 3 Months

Banco Interamericano de Desarrollo
Skills you'll gain: Digital Transformation, Talent Management, Business Transformation, Technology Strategies, Cybersecurity, Project Design, Policy Development, Public Administration, Service Design, Governance, Program Evaluation, Strategic Planning, Process Improvement, Data Management, Process Analysis
Beginner · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Hunting, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Data Persistence
Intermediate · Course · 1 - 3 Months