
AI CERTs
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Strategy, Encryption
Advanced · Course · 1 - 3 Months

Skills you'll gain: Security Controls, Continuous Monitoring, Security Management, Vulnerability Management, Authorization (Computing), Anomaly Detection
Intermediate · Course · 1 - 4 Weeks
LearnQuest
Skills you'll gain: Blockchain, Key Management, Security Controls, Cryptography, Cybersecurity, Security Engineering, Application Security, Network Security, Vulnerability Assessments, Encryption, Secure Coding, Data Security, Distributed Denial-Of-Service (DDoS) Attacks, Public Key Cryptography Standards (PKCS), Security Testing, Vulnerability Management, Transaction Processing, Risk Management, Code Review, Data Integrity
Intermediate · Specialization · 3 - 6 Months

Palo Alto Networks
Skills you'll gain: Cyber Operations, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Information and Event Management (SIEM), Continuous Monitoring, Threat Detection, Threat Management, Security Controls, Incident Response, Automation, Artificial Intelligence and Machine Learning (AI/ML)
Intermediate · Course · 1 - 3 Months

Palo Alto Networks
Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Application Security, Cloud Infrastructure, Network Security, Data Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

Illinois Tech
Skills you'll gain: Database Design, Relational Databases, Database Systems, Database Management, NoSQL, Databases, Database Development, SQL, Big Data, Model Evaluation, Apache Hadoop, Database Management Systems, MySQL, Statistical Analysis, Data Visualization, Database Theory, Data Analysis, Exploratory Data Analysis, Transaction Processing, Data Preprocessing
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

Edureka
Skills you'll gain: AI Security, Responsible AI, Data Ethics, LLM Application, Generative AI, Google Gemini, Artificial Intelligence, Cloud Security, Governance Risk Management and Compliance, Cyber Security Strategy, Security Strategy, Artificial Intelligence and Machine Learning (AI/ML), Computer Security Awareness Training, Network Security, Security Management, Cyber Attacks, Cyber Security Policies, Natural Language Processing, Risk Management, Supply Chain
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Exploitation techniques, Wireless Networks, Splunk, Information Privacy
Intermediate · Course · 1 - 3 Months

University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Data Presentation, Interactive Data Visualization, Data Storytelling, Dashboard, Tableau Software, Plot (Graphics), Scatter Plots, Data Mapping, Graphing
Mixed · Course · 1 - 3 Months

Skills you'll gain: Data Migration, Cloud Storage, Data Management, Data Integration, Data Storage, Data Infrastructure, Data Architecture, Extract, Transform, Load, Data Security, Data Transformation, Data Pipelines, Disaster Recovery
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Blockchain, Cryptography, Encryption, Application Security, Threat Modeling, Cybersecurity, Secure Coding, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks