
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Generative AI, Continuous Monitoring, MLOps (Machine Learning Operations), Predictive Modeling, Google Cloud Platform, Responsible AI, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Data Quality
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: MLOps (Machine Learning Operations), Jupyter, Google Cloud Platform, Machine Learning, Virtual Machines, Development Environment, Exploratory Data Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Migration, Cloud Storage, Data Management, Data Integration, Data Storage, Data Infrastructure, Data Architecture, Extract, Transform, Load, Data Security, Data Pipelines, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Linux, Package and Software Management, Linux Administration, Red Hat Enterprise Linux, Linux Commands, User Accounts, Operating System Administration, Linux Servers, OS Process Management, File Management, Command-Line Interface, Unix Shell, System Monitoring, General Networking, Firewall, Open Source Technology
Beginner · Course · 1 - 3 Months

Skills you'll gain: AWS Kinesis, Amazon DynamoDB, Amazon S3, Data Pipelines, Amazon CloudWatch, Cloud Storage, Real Time Data, AWS Identity and Access Management (IAM), Data Storage, Database Management Systems, Data Management, Data Infrastructure, Cloud Security, Encryption, Scalability
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Key Management, Cryptography, Encryption, Authentications, Algorithms
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Cybersecurity, Network Security, Business Continuity, Disaster Recovery, Cryptography, Encryption, Infrastructure as Code (IaC), Infrastructure Security, Software-Defined Networking, Security Management, Identity and Access Management, Security Controls, Computer Networking, System Monitoring, Authorization (Computing), Authentications
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Unsupervised Learning, Supervised Learning, Deep Learning, Machine Learning Algorithms, Exploratory Data Analysis, Dimensionality Reduction, Applied Machine Learning, Machine Learning, Scikit Learn (Machine Learning Library), Keras (Neural Network Library), Data Science, Artificial Neural Networks, Predictive Modeling, Tensorflow, Random Forest Algorithm, Computer Vision, Image Analysis, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Illinois Tech
Skills you'll gain: Process Improvement, Process Management, Business Process, Business Process Management, Process Analysis, Business Process Improvement, Performance Improvement, Quality Improvement, Continuous Improvement Process, Process Mapping, Quality Management, Workflow Management, Operational Excellence, Return On Investment, Change Management, Performance Measurement, Risk Management, Business Technologies, Project Management, Pareto Chart
Build toward a degree
Intermediate · Course · 1 - 3 Months

Vanderbilt University
Skills you'll gain: Spring Boot, Spring Framework, Restful API, API Design, Web Applications, Software Testing, Unit Testing, Object-Relational Mapping, Application Security, Authentications, JSON, Authorization (Computing), Data Access, Dependency Analysis
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
Beginner · Course · 1 - 3 Months