
Skills you'll gain: Active Directory, Software Installation, System Configuration, Microsoft Servers, Microsoft Intune (Mobile Device Management Software), Hyper-V, Enterprise Architecture, System Implementation, Configuration Management, IT Infrastructure, Mac OS, Virtual Machines, Microsoft Azure, System Requirements, Scalability
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Operating Systems, C (Programming Language), Performance Tuning, Virtual Machines, System Programming, Virtualization, Linux
Advanced · Course · 1 - 3 Months

Universidad Nacional Autónoma de México
Skills you'll gain: Exploratory Data Analysis, Pandas (Python Package), Data Visualization, Extract, Transform, Load, Data Analysis, NumPy, Time Series Analysis and Forecasting, Data Visualization Software, Data Science, Python Programming, Jupyter, Package and Software Management, Graphing, Data Import/Export, Data Manipulation, Scripting, Software Installation, Linux, Scripting Languages, Programming Principles
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), OSI Models, Wide Area Networks, Network Troubleshooting, TCP/IP, Wireless Networks, Cloud Computing, Network Routing, Routing Protocols, Network Security, Network Monitoring, Event Monitoring, Threat Detection, Threat Management, Network Performance Management, Network Switches, Network Planning And Design, Network Administration, Network Protocols
Beginner · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Security Awareness, Threat Modeling, Risk Analysis, Problem Solving, Communication
Build toward a degree
Beginner · Course · 1 - 3 Months

Skills you'll gain: MySQL, Database Management, Stored Procedure, Database Development, SQL, Performance Tuning, Relational Databases, JSON, Analytics, Data Analysis, Transaction Processing, Data Integrity
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: AWS CloudFormation, Amazon S3, AWS Identity and Access Management (IAM), Amazon CloudWatch, Amazon Web Services, Disaster Recovery, Identity and Access Management, Infrastructure as Code (IaC), Amazon Elastic Compute Cloud, System Monitoring, Cloud Storage, Data Management, Cloud Security, Virtual Private Networks (VPN), Data Storage Technologies, Event Monitoring, Cloud Management, Application Deployment, Network Routing, Network Architecture
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Network Security, Remote Access Systems, Disaster Recovery, OSI Models, General Networking, Network Administration, Network Troubleshooting, Computer Networking, Network Architecture, Network Infrastructure, Networking Hardware, Network Monitoring, TCP/IP, Virtual Private Networks (VPN), Network Protocols, Cybersecurity, Computer Security, Data Centers, Virtualization, Authentications
Intermediate · Specialization · 1 - 3 Months

Coursera
Skills you'll gain: SQL, Data Manipulation, Relational Databases, Database Design, Databases, Data Integrity, Database Management Systems, Debugging, Data Management
Intermediate · Guided Project · Less Than 2 Hours

Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, Network Security, System Monitoring, Network Protocols
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Programming Principles, Information Technology, Operating Systems, Web Applications, Collaborative Software, Computer Literacy, Python Programming, Application Development, Microsoft Office, Linux, Microsoft Windows, Mac OS
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
Intermediate · Course · 1 - 4 Weeks