The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Data Modeling, Enterprise Resource Planning, Dashboard, Business Intelligence, Data Visualization Software, Workflow Management, Pivot Tables And Charts, Data Import/Export, Extract, Transform, Load, Data Integration, Microsoft Excel, Data Transformation, Data Security, Scripting
Mixed · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Intrusion Detection and Prevention, Malware Protection, Prompt Engineering, Anomaly Detection, Vulnerability Management, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Open Web Application Security Project (OWASP), Technical Design, Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Engineering, Software Development Life Cycle
Beginner · Specialization · 3 - 6 Months

Microsoft
Skills you'll gain: Microsoft 365, Network Security, Cloud Management, Microsoft Azure, Business Software, Computer Hardware, Virtual Machines, Identity and Access Management, Cybersecurity, Network Troubleshooting, Microsoft Office, Desktop Support, Virtual Private Networks (VPN), Azure Active Directory, Technical Support, Hardware Troubleshooting, System Monitoring, Disaster Recovery, Cloud Computing, Network Protocols
Beginner · Professional Certificate · 3 - 6 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption, Hardening
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
Intermediate · Course · 1 - 3 Months

University of Michigan
Skills you'll gain: Cyber Security Policies, Security Engineering, Cybersecurity, Security Awareness, Threat Modeling, Policy Analysis, Political Sciences, Vulnerability Assessments, Public Policies, Public Safety and National Security, Human Factors, Human Computer Interaction, Usability, Software Testing
Beginner · Course · 1 - 3 Months

Columbia University
Skills you'll gain: International Finance, Derivatives, Financial Systems, Balance Sheet, Financial Market, Payment Systems, Banking, Capital Markets, Economics, Market Liquidity, Financial Regulation, Finance, Market Dynamics
Mixed · Course · 3 - 6 Months

Google Cloud
Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud Infrastructure, Prompt Engineering, Containerization, Identity and Access Management, Cloud-Native Computing, CI/CD, Cloud Storage, Application Deployment, Cloud Management, Cloud Services, Virtual Machines, Scalability, Cloud Computing, Docker (Software), Application Development, Load Balancing, Generative AI Agents, Continuous Integration
Beginner · Specialization · 3 - 6 Months

University of Colorado System
Skills you'll gain: Cryptography, Encryption, Cybersecurity, Computer Security, Theoretical Computer Science, Information Architecture
Intermediate · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: Cryptography, Security Requirements Analysis, Encryption, Data Security, Security Management, Personally Identifiable Information, Threat Management, ISO/IEC 27001, Cyber Security Policies, Information Assurance, General Data Protection Regulation (GDPR), Cybersecurity, Information Privacy, Security Awareness, Threat Detection, Cyber Risk, Human Factors, Authentications, Data Integrity, Authorization (Computing)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
Intermediate · Course · 1 - 4 Weeks