
Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Model Evaluation, Predictive Modeling, Data Science, Analytical Skills, Data Analysis, Data Presentation, Data Collection, Data Storytelling, Data Cleansing, Statistical Analysis, Data Manipulation, Data Preprocessing, R Programming, Machine Learning, Natural Language Processing
Mixed · Course · 1 - 3 Months

DeepLearning.AI
Skills you'll gain: LLM Application, Tool Calling, AI Workflows, Hugging Face, Unstructured Data, SQL, Web Services, Prompt Engineering, AI Enablement, Database Management, Restful API, Data Processing
Intermediate · Project · Less Than 2 Hours

Skills you'll gain: Graph Theory, Data Structures, Algorithms, Program Development, Programming Principles, Computational Thinking, Theoretical Computer Science, Computer Science, Python Programming
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Security Engineering, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Google Sheets, Data Literacy, Data Visualization Software, Spreadsheet Software, Big Data, Data Storytelling, Data Analysis, Data Presentation, Google Cloud Platform, Data Integration, Data Manipulation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Apache Kafka, Apache Hadoop, Apache Spark, Real Time Data, Scala Programming, Data Integration, Command-Line Interface, Apache Hive, Big Data, Applied Machine Learning, Data Processing, Apache, System Design and Implementation, Apache Cassandra, Data Pipelines, Java, Distributed Computing, IntelliJ IDEA, Application Deployment, Enterprise Application Management
Intermediate · Specialization · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Intrusion Detection and Prevention, Network Analysis, Exploitation techniques, Cryptography, Network Protocols, Computer Networking, General Networking, TCP/IP, Firewall, Encryption
Build toward a degree
Intermediate · Course · 1 - 3 Months

Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Threat Modeling, Cyber Security Policies, Cyber Risk, Governance Risk Management and Compliance, ISO/IEC 27001, Cyber Security Assessment, Cybersecurity, Compliance Management, Governance, NIST 800-53, Risk Mitigation, Risk Management, Audit Planning, Risk Appetite, Policy Analysis, Regulation and Legal Compliance, Stakeholder Engagement, Auditing
Beginner · Course · 1 - 4 Weeks
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Large Language Modeling, AI Security, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Network Protocols, Data Ethics, Internet Of Things, Artificial Intelligence
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Deployment, Open Web Application Security Project (OWASP), CI/CD, Application Deployment, DevOps, Ansible, Docker (Software), Cloud Infrastructure, Infrastructure Security, IT Automation, Application Security, Containerization, Bash (Scripting Language), Continuous Delivery, Firewall, Unit Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Validation, Data Cleansing, Alteryx, Data Quality, Microsoft Excel, Data Integrity, Data Integration, Data Import/Export, Data Loss Prevention, Anomaly Detection
Intermediate · Guided Project · Less Than 2 Hours