
University of Illinois Urbana-Champaign
Skills you'll gain: Professional Development, Business Ethics, Professionalism, Decision Making, Ethical Standards And Conduct, Personal Integrity, Trustworthiness, Communication Strategies, Communication, Problem Solving, Interpersonal Communications, Self-Awareness, Conflict Management
Beginner · Course · 1 - 3 Months

Huddersfield Sandbox
Skills you'll gain: Journalism, Business Ethics, Ethical Standards And Conduct, Media and Communications, Content Creation, Digital Media Strategy, Diversity and Inclusion, Social Media, Accountability, Mental Health Diseases and Disorders
Intermediate · Course · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Cyber Security Assessment, Cybersecurity, Data Ethics, Computer Networking, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
Intermediate · Course · 1 - 3 Months

University of Michigan
Skills you'll gain: Writing and Editing, Editing, Constructive Feedback, Concision, Writing, Organizational Skills, Proofreading, Storytelling, Productivity, Planning, Detail Oriented, Time Management, Brainstorming, Content Creation, Overcoming Obstacles, Resourcefulness, Decision Making, Critical Thinking, Creativity, Professional Development
Beginner · Specialization · 3 - 6 Months
DeepLearning.AI
Skills you'll gain: Disaster Recovery, Data Analysis, Jupyter, Exploratory Data Analysis, Image Analysis, Data Ethics, Emergency Response, Artificial Intelligence, Machine Learning, Predictive Modeling, Applied Machine Learning, Mitigation, Responsible AI, Text Mining, Environmental Monitoring, Climate Change Mitigation, Artificial Neural Networks, Computer Vision, Supervised Learning, Natural Language Processing
Beginner · Specialization · 1 - 3 Months

University of Cape Town
Skills you'll gain: Informed Consent, Healthcare Ethics, Scientific Methods, Intensive Care Medicine, Diagnostic Tests, Patient Education And Counseling, Cultural Diversity, Critical Care, Ethical Standards And Conduct, Cultural Sensitivity, Patient Communication
Intermediate · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Build toward a degree
Intermediate · Course · 1 - 3 Months

SAE Institute México
Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Cost Estimation, Work Breakdown Structure, Project Risk Management, Project Schedules, Project Performance, Estimation, Project Planning, Communication Planning, Quality Management, Change Control, Timelines, Project Management, Milestones (Project Management), Planning, Peer Review, Budgeting, Scheduling, Risk Analysis, Project Implementation, Risk Management
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention
Intermediate · Specialization · 3 - 6 Months