
Beginner · Course · 1 - 3 Months

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Data Security, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Information Systems Security, Data Validation, Compliance Management, Risk Mitigation, Data Governance, Information Assurance, Security Controls, Law, Regulation, and Compliance, Auditing, Data Integrity, Personally Identifiable Information, Identity and Access Management, Business Continuity
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
Intermediate · Course · 1 - 4 Weeks
University of Illinois Urbana-Champaign
Skills you'll gain: Audit Planning, Internal Auditing, Internal Controls, Stakeholder Communications, Governance Risk Management and Compliance, Report Writing, Internal Communications, Continuous Improvement Process, Environmental Social And Corporate Governance (ESG), Strategic Communication, Governance, Stakeholder Management, Risk Analysis, Operational Risk, Enterprise Risk Management (ERM), Risk Management, Benchmarking, Business Ethics, Presentations, Fraud detection
Intermediate · Course · 1 - 4 Weeks

Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: AI Security, Responsible AI, LLM Application, Unit Testing, Verification And Validation, API Testing, Test Case, Security Testing, Software Testing, Code Coverage, Large Language Modeling, Model Evaluation, Test Tools, Test Script Development, Prompt Engineering, Threat Modeling, Penetration Testing, Maintainability, Software Technical Review, Quality Assessment
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Supplier Quality Management, Quality Control, Supplier Performance Management, Corrective and Preventive Action (CAPA), Quality Assurance and Control, Quality Monitoring, Material Handling, Verification And Validation, Compliance Reporting, Management Reporting, Investigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Data Security, Security Controls, Computer Security Awareness Training, Cybersecurity, Threat Detection, Authorization (Computing), Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Continuous Monitoring
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Medical Privacy, Medical Records, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Health Information Management and Medical Records, Clinical Documentation, Electronic Medical Record, Document Management, Patient Safety, Record Keeping, Records Management, Auditing, Regulatory Compliance, Document Control, Information Privacy, File Management, Quality Assurance, Data Entry
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Data Sharing, Security Controls, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Authentications, OAuth, Android Development, Application Security, Mobile Security, Secure Coding, Authorization (Computing), Security Engineering, Security Controls, Multi-Factor Authentication, Human Factors (Security), Vulnerability Management, Malware Protection, Threat Management, Data Integrity, Risk Management, Debugging, Encryption
Mixed · Course · 1 - 4 Weeks

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Digital Forensics, Security Requirements Analysis, Penetration Testing, Information Systems Security, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cybersecurity, Vulnerability Management, Exploitation techniques, Data Security, Security Management, Personally Identifiable Information
Beginner · Specialization · 1 - 3 Months