
University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, IT Management, System Monitoring, Cyber Security Policies, Enterprise Security, Compliance Auditing, Security Strategy, Systems Administration, Operating System Administration, Governance, Security Controls, Organizational Strategy, Patch Management, Continuous Monitoring, Unix, Procedure Development, Incident Response
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Continuous Monitoring, Medical Privacy, Personally Identifiable Information, Risk Management, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management, Health Technology, Information Privacy, Health Care Procedure and Regulation, Risk Mitigation, Security Management, Risk Analysis, Data Management, Patient Safety, Security Awareness, Data Security, Cybersecurity, Health Care, Information Systems Security, Cloud Security
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Linux, Debugging, Cyber Risk
Beginner · Professional Certificate · 3 - 6 Months

Georgia Institute of Technology
Skills you'll gain: User Experience Design, Prototyping, User Centered Design, Usability, Requirements Analysis, UI/UX Research, Interaction Design, User Interface (UI) Design, Usability Testing, User Research
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Business Continuity, Disaster Recovery, Cybersecurity, Security Management, Computer Security Incident Management, Crisis Management, Information Assurance
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Scenario Testing, Technical Communication, Simulations
Advanced · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Data Flow Diagrams (DFDs), Open Web Application Security Project (OWASP), Software Architecture, Secure Coding, Object Oriented Design, Software Design Patterns, Database Management, Security Software, Systems Design, Software Development Life Cycle, Technical Design
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: AI Workflows, AI Orchestration, Agentic Workflows, AI Security
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: MLOps (Machine Learning Operations), Data Governance, Prompt Engineering, Continuous Deployment, Generative AI, System Monitoring, CI/CD, Responsible AI, Automation, DevOps, Compliance Management, Performance Tuning, Data Pipelines, Kubernetes, Docker (Software), Containerization, Data Security, Risk Management, Dashboard, Cloud Platforms
Intermediate · Specialization · 3 - 6 Months

Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Data Store, Extract, Transform, Load, Data Architecture, Data Pipelines, Big Data, Data Warehousing, Data Governance, Apache Hadoop, Relational Databases, Apache Spark, Data Lakes, Databases, SQL, NoSQL, Data Security, Data Science
Beginner · Course · 1 - 4 Weeks

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Hardening, Data Integrity, Security Testing, System Monitoring, Cybersecurity, Patch Management, Threat Modeling, Exploitation techniques, Authorization (Computing), Cryptography, Extensible Markup Language (XML), System Configuration
Intermediate · Specialization · 3 - 6 Months