
Skills you'll gain: Data Ethics, Business Ethics, Responsible AI, Ethical Standards And Conduct, Legal Risk, Sustainable Development, Law, Regulation, and Compliance, Medical Privacy, Information Privacy, Artificial Intelligence and Machine Learning (AI/ML), Decision Making, Artificial Intelligence, Accountability, Business Strategy, Safety and Security, Emerging Technologies, Human Centered Design
Mixed · Course · 1 - 3 Months

Skills you'll gain: Responsible AI, Data Ethics, Generative AI, AI Security, Risking, Personally Identifiable Information, General Data Protection Regulation (GDPR), Engineering Software, Information Privacy, Artificial Intelligence, Data Security, Continuous Monitoring, Ethical Standards And Conduct, Governance
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Administration, Exploitation techniques, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Data Ethics, Responsible AI, Business Ethics, Strategic Decision-Making, Data Management, Initiative and Leadership, Information Privacy, Market Research, Ethical Standards And Conduct, Governance, Strategic Leadership, Market Intelligence, Artificial Intelligence, AI literacy, Law, Regulation, and Compliance, Market Analysis, Economics, Policy, and Social Studies, Accountability
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Business Ethics, Ethical Standards And Conduct, Technical Management, Engineering Management, Ancient History, Human Development, Liberal Arts, Business Management, Culture, Anthropology, Social Sciences, Leadership Development, Leadership
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Agentic systems, Data Ethics, Law, Regulation, and Compliance, Agentic Workflows, Discussion Facilitation, Regulatory Requirements, Business Ethics, Ethical Standards And Conduct, Compliance Training, Regulatory Compliance, Artificial Intelligence, Case Studies, Generative AI Agents, AI literacy, Decision Intelligence, Governance, Accountability, Predictive Modeling
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Unix, Cyber Operations, Computer Security, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Memory Management, Remote Access Systems, Authentications
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Healthcare Ethics, Ethical Standards And Conduct, Responsible AI, Clinical Research Ethics, Data Security, Data Science, Medical Privacy, Machine Learning Algorithms, Algorithms, Information Privacy, Artificial Intelligence, Diversity Awareness, Cybersecurity, Case Studies
Build toward a degree
Beginner · Course · 1 - 3 Months
Duke University
Skills you'll gain: Data Ethics, Responsible AI, Data Visualization, Data Presentation, Ethical Standards And Conduct, Data Science, Data Collection, Personally Identifiable Information, Information Privacy, Algorithms
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: AI Security, Responsible AI, Federated Learning, Information Privacy, Cloud Security, Personally Identifiable Information, Google Cloud Platform, Data Security, Artificial Intelligence and Machine Learning (AI/ML), Generative AI, Security Controls, Data Loss Prevention, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cryptographic Protocols, Cyber Security Assessment, Cloud Computing, Data Security, Key Management, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks