The language used throughout the course, in both instruction and assessments.

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, Data Security, Risk Management, Software Development Methodologies, Process Design, Information Systems, Workflow Management, Business Systems Analysis, Microsoft Office, E-Commerce, Microsoft Excel
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Digital Assets, Blockchain, Emerging Technologies, Business Transformation, Digital Transformation, E-Commerce, Systems Design, Scalability, Business Strategy, Governance
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Data Security, Database Application, Web Applications, Cryptography, Authentications, Configuration Management, Session Initiation Protocols, Computer Programming
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: TCP/IP, Network Protocols, Network Monitoring, OSI Models, Network Security, Web Servers, Network Analysis
Beginner · Guided Project · Less Than 2 Hours

Alfaisal University | KLD
Skills you'll gain: Event Management, Event Planning, Event Marketing, Advertising, Safety and Security, Marketing Communications, Advertising Campaigns, Promotional Strategies, Budget Management, Expense Management, Program Evaluation, Human Resources Management and Planning, Return On Investment
Beginner · Course · 1 - 3 Months

Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Cloud Services, Legal Risk, Cloud Computing, Tax, Tax Laws, Law, Regulation, and Compliance, Intellectual Property, Cloud Security, Personally Identifiable Information, Tax Compliance, Data Security, Information Privacy, Regulation and Legal Compliance, Contract Negotiation, Vendor Contracts, Contract Review, Data Governance, Data Access, Cybersecurity
Beginner · Specialization · 1 - 3 Months
CertNexus
Skills you'll gain: Data Ethics, Responsible AI, Accountability, Risk Management, Risk Analysis, Information Privacy, Risk Mitigation, Safety and Security, Business Ethics, Artificial Intelligence, Machine Learning
Beginner · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Cloud Infrastructure, Identity and Access Management, Google Cloud Platform, Application Deployment, Kubernetes, Google App Engine, Load Balancing, Cloud Management, Microservices, Infrastructure As A Service (IaaS), Cloud Security, CI/CD, Cloud Applications, Cloud Computing, Cloud Computing Architecture, Cloud Storage, Network Architecture, Data Storage, Platform As A Service (PaaS), Service Level Agreement
Intermediate · Specialization · 3 - 6 Months

Vanderbilt University
Skills you'll gain: JUnit, Unit Testing, Maintainability, Software Design Patterns, Software Testing, Test Automation, Integration Testing, Test Driven Development (TDD), Testability, Software Engineering, System Testing, Android Development, Application Security, Software Architecture, Application Design
Mixed · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Data Visualization Software, Interactive Data Visualization, Visualization (Computer Graphics), Data Security, Data Presentation, Cybersecurity, Technical Communication, Healthcare Ethics, Cyber Attacks, Statistical Reporting, Data Storytelling, User Centered Design, Authentications, Data Science, Ethical Standards And Conduct, User Experience Design, Responsible AI, Information Privacy, Analysis
Build toward a degree
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
Intermediate · Course · 1 - 4 Weeks