
Skills you'll gain: Responsible AI, Data Ethics, Organizational Strategy, Artificial Intelligence, Strategic Leadership, Cross-Functional Collaboration, Governance, Artificial Intelligence and Machine Learning (AI/ML), Decision Making, Business Ethics, Technology Roadmaps, Data Governance, Enterprise Architecture, Change Management
Intermediate · Course · 1 - 4 Weeks

AI CERTs
Skills you'll gain: Responsible AI, AI Security, Data Ethics, Governance, Data Governance, Law, Regulation, and Compliance, Ethical Standards And Conduct, Compliance Training, Artificial Intelligence, Business Ethics, Compliance Management, Accountability, Regulatory Requirements, Governance Risk Management and Compliance, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Stakeholder Engagement
Beginner · Course · 1 - 3 Months

Skills you'll gain: Business Ethics, Responsible AI, AI Security, Data Ethics, Ethical Standards And Conduct, Intellectual Property, Stakeholder Engagement, Diversity Equity and Inclusion Initiatives, Information Privacy
Intermediate · Course · 1 - 3 Months

EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Beginner · Course · 1 - 3 Months

Utrecht University
Skills you'll gain: Research, Intellectual Property, Peer Review, Ethical Standards And Conduct, Higher Education, Mentorship
Beginner · Course · 1 - 3 Months

Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Responsible AI, NIST 800-53, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
Intermediate · Course · 1 - 3 Months
University of Leeds
Skills you'll gain: Data Ethics, Ethical Standards And Conduct, Data-Driven Decision-Making, Responsible AI, Risking, Research Methodologies, Law, Regulation, and Compliance, Governance
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Data Ethics, Business Ethics, Responsible AI, Ethical Standards And Conduct, Sustainable Development, Law, Regulation, and Compliance, Data Security, Medical Privacy, Information Privacy, Artificial Intelligence and Machine Learning (AI/ML), Decision Making, Business Leadership, Artificial Intelligence, Accountability, Business Strategy, Safety and Security, Emerging Technologies, Human Centered Design
Mixed · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security
Beginner · Specialization · 3 - 6 Months